2019 14th International Conference on Design &Amp; Technology of Integrated Systems in Nanoscale Era (DTIS) 2019
DOI: 10.1109/dtis.2019.8735011
|View full text |Cite
|
Sign up to set email alerts
|

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula

Abstract: Due to the nature of applications such as critical infrastructure and the Internet of Things etc. side channel analysis attacks are becoming a serious threat. Side channel analysis attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. A new type of SCA are the so called horizontal SCAs. Well known randomization based countermeasures are effective means against vertical DPA attacks but they are not effective against hori… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…The resistance of kP designs can additionally be increased by depending on the activity of the field multiplier. To exploit the field multiplier as a countermeasure different multiplication methods have to be combined [31]. We did not find any information that such a countermeasure was applied in any of the researched commercial chips.…”
Section: Industrial Authentications Productsmentioning
confidence: 93%
“…The resistance of kP designs can additionally be increased by depending on the activity of the field multiplier. To exploit the field multiplier as a countermeasure different multiplication methods have to be combined [31]. We did not find any information that such a countermeasure was applied in any of the researched commercial chips.…”
Section: Industrial Authentications Productsmentioning
confidence: 93%
“…In our recent works [29][30][31], we investigated the influence of the activity of different field multipliers on the resistance of kP designs against horizontal SCA attacks. In [29], we investigated the application of the dummy activity of the multiplier as a means to reduce the vulnerability of our hardware accelerator for a single EC, P-256, to horizontal attacks.…”
Section: Influence Of Dummy Partial Multiplications On the Design Res...mentioning
confidence: 99%
“…The activity of the field multiplier can increase the inherent resistance of kP designs against SCA attacks. To exploit the field multiplier as a countermeasure different multiplication methods have to be combined [22]. We didn't find any information about the implementation of such a countermeasure in industrial chips.…”
Section: Background: Verical and Horizontal Attacksmentioning
confidence: 99%