Paper 2014/993

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA

Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer

Abstract

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks use identical devices either for preparation of attacks or for measurements. By the preparation of attacks the structure and the electrical circuit of devices, that are identical to the target, is analyzed. By side channel attacks usually the same device is used many times for measurements, i.e. measurements on the identical device are made serially in time. Another way is to exploit the difference of side channel leakages; here two identical devices are used parallel, i.e. at the same time. In this paper we investigate the influence of the electrical circuit of a cryptographic implementation on the shape of the resulting power trace, because individualizing of circuits of cryptographic devices can be a new means to prevent attacks that use identical devices. We implemented three different designs that provide exactly the same cryptographic function, i.e. an ECC kP multiplication. For our evaluation we use two different FPGAs. The visualization of the routed design and measurement results show clear differences in the resources consumed as well as in the power traces.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
cryptographic hardware architecturessecurity processorsFPGA
Contact author(s)
basmer @ ihp-microelectronics com
History
2014-12-19: last of 2 revisions
2014-12-18: received
See all versions
Short URL
https://ia.cr/2014/993
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/993,
      author = {Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer},
      title = {How Different Electrical Circuits of {ECC} Designs Influence the Shape of Power Traces measured on {FPGA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/993},
      year = {2014},
      url = {https://eprint.iacr.org/2014/993}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.