论文标题
水平DPA对ECC的攻击:实现的现场乘法公式的影响
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula
论文作者
论文摘要
由于关键基础架构和物联网等应用的性质。侧渠道分析攻击已成为严重的威胁。侧渠道分析攻击从可以观察到加密实现的行为并提供简化揭示键的提示的事实中利用了优势。一种新型的SCA是所谓的水平SCA。众所周知的基于随机的对策是针对垂直DPA攻击的有效手段,但它们对水平DPA攻击无效。在本文中,我们研究了用于实施$ GF(2^n)$ - 元素乘法的公式如何影响蒙哥马利KP实施的水平DPA攻击结果。我们实施了5种具有不同部分乘数的设计,即基于不同的乘法公式。我们使用了两种不同的技术,即130和250 nm技术,为我们的分析模拟了功率迹线。我们表明,实施的乘法公式会影响水平攻击的成功,但我们还了解到,它的影响因技术而异。我们的分析还表明,使用不同的乘法公式作为单个对策不足以保护加密设计免受水平DPA攻击。
Due to the nature of applications such as critical infrastructure and the Internet of Things etc. side channel analysis attacks are becoming a serious threat. Side channel analysis attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. A new type of SCA are the so called horizontal SCAs. Well known randomization based countermeasures are effective means against vertical DPA attacks but they are not effective against horizontal DPA attacks. In this paper we investigate how the formula used to implement the multiplication of $GF(2^n)$-elements influences the results of horizontal DPA attacks against a Montgomery kP implementation. We implemented 5 designs with different partial multipliers, i.e. based on different multiplication formulae. We used two different technologies, i.e. a 130 and a 250 nm technology, to simulate power traces for our analysis. We show that the implemented multiplication formula influences the success of horizontal attacks significantly, but we also learned that its impact differs from technology to technology. Our analysis also reveals that the use of different multiplication formulae as the single countermeasure is not sufficient to protect cryptographic designs against horizontal DPA attacks.