Paper 2018/1181

Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe

Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, and Peter Langendoerfer

Abstract

Implementing cryptographic algorithms in a tamper resistant way is an extremely complex task as the algorithm used and the target platform have a significant impact on the potential leakage of the implementation. In addition the quality of the tools used for the attacks is of importance. In order to evaluate the resistance of a certain design against electromagnetic emanation attacks – as a highly relevant type of attacks – we discuss the quality of different electromagnetic (EM) probes as attack tools. In this paper we propose to use the results of horizontal attacks for comparison of measurement setup and for determining the best suitable instruments for measurements. We performed horizontal differential electromagnetic analysis (DEMA) attacks against our ECC design that is an im-plementation of the Montgomery kP algorithm for the NIST elliptic curve B-233. We experimented with 7 different EM probes under same conditions: attacked FPGA, design, inputs, measurement point and measurement equipment were the same, excepting EM probes. The used EM probe influences the success rate of performed attack significantly. We used this fact for the comparison of probes and for determining the best suitable one.

Metadata
Available format(s)
PDF
Publication info
Preprint. MAJOR revision.
Keywords
Side channel analysiselectromagnetic (EM) probedifference of the mean test
Contact author(s)
wittke @ ihp-microelectronics com
History
2018-12-21: last of 2 revisions
2018-12-05: received
See all versions
Short URL
https://ia.cr/2018/1181
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/1181,
      author = {Christian Wittke and Ievgen Kabin and Dan Klann and Zoya Dyka and Anton Datsuk and Peter Langendoerfer},
      title = {Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe},
      howpublished = {Cryptology ePrint Archive, Paper 2018/1181},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/1181}},
      url = {https://eprint.iacr.org/2018/1181}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.