Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks

Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fiel...

Full description

Bibliographic Details
Main Authors: Ievgen Kabin, Zoya Dyka, Peter Langendoerfer
Format: Article
Language:English
Published: MDPI AG 2022-04-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/8/3083
_version_ 1797434261428502528
author Ievgen Kabin
Zoya Dyka
Peter Langendoerfer
author_facet Ievgen Kabin
Zoya Dyka
Peter Langendoerfer
author_sort Ievgen Kabin
collection DOAJ
description Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed.
first_indexed 2024-03-09T10:29:41Z
format Article
id doaj.art-f874bc876183485da3b5d600b8f42b15
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T10:29:41Z
publishDate 2022-04-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-f874bc876183485da3b5d600b8f42b152023-12-01T21:23:52ZengMDPI AGSensors1424-82202022-04-01228308310.3390/s22083083Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace AttacksIevgen Kabin0Zoya Dyka1Peter Langendoerfer2IHP—Leibniz-Institut für Innovative Mikroelektronik, 15236 Frankfurt, GermanyIHP—Leibniz-Institut für Innovative Mikroelektronik, 15236 Frankfurt, GermanyIHP—Leibniz-Institut für Innovative Mikroelektronik, 15236 Frankfurt, GermanyElliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed.https://www.mdpi.com/1424-8220/22/8/3083elliptic curve cryptography (ECC)Montgomery <i>kP</i>atomic patternsB-curvesP-curvesside-channel analysis (SCA) attacks
spellingShingle Ievgen Kabin
Zoya Dyka
Peter Langendoerfer
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
Sensors
elliptic curve cryptography (ECC)
Montgomery <i>kP</i>
atomic patterns
B-curves
P-curves
side-channel analysis (SCA) attacks
title Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
title_full Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
title_fullStr Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
title_full_unstemmed Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
title_short Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks
title_sort atomicity and regularity principles do not ensure full resistance of ecc designs against single trace attacks
topic elliptic curve cryptography (ECC)
Montgomery <i>kP</i>
atomic patterns
B-curves
P-curves
side-channel analysis (SCA) attacks
url https://www.mdpi.com/1424-8220/22/8/3083
work_keys_str_mv AT ievgenkabin atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks
AT zoyadyka atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks
AT peterlangendoerfer atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks