automatic generation of hcca resistant scalar
play

Automatic Generation of HCCA Resistant Scalar Multiplication - PowerPoint PPT Presentation

Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands Poulami Das, Debapriya Basu Roy and, Debdeep Mukhopadhyay Indian Institute of Technology Kharagpur 29 / 09 / 2017 Debapriya


  1. Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands Poulami Das, Debapriya Basu Roy and, Debdeep Mukhopadhyay Indian Institute of Technology Kharagpur 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 1/22

  2. Outline Introduction 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  3. Outline Introduction Motivation 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  4. Outline Introduction Motivation Horizontal Collision Correlation Analysis (HCCA) 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  5. Outline Introduction Motivation Horizontal Collision Correlation Analysis (HCCA) Asymmetric Leakage of Long Integer Field Multiplication 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  6. Outline Introduction Motivation Horizontal Collision Correlation Analysis (HCCA) Asymmetric Leakage of Long Integer Field Multiplication Countermeasure Design 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  7. Outline Introduction Motivation Horizontal Collision Correlation Analysis (HCCA) Asymmetric Leakage of Long Integer Field Multiplication Countermeasure Design Conclusion 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 2/22

  8. Introduction Cryptography has emerged as the practice or study of securing communications against third parties called adversaries. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 3/22

  9. Introduction Cryptography has emerged as the practice or study of securing communications against third parties called adversaries. Public Key Cryptography (PKC) was introduced to address key issues of Key Distribution Problem and Digital Signature Verification problems. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 3/22

  10. Introduction Cryptography has emerged as the practice or study of securing communications against third parties called adversaries. Public Key Cryptography (PKC) was introduced to address key issues of Key Distribution Problem and Digital Signature Verification problems. The two most widely used primitives of PKC are RSA and Elliptic Curve Cryptography. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 3/22

  11. Introduction Cryptography has emerged as the practice or study of securing communications against third parties called adversaries. Public Key Cryptography (PKC) was introduced to address key issues of Key Distribution Problem and Digital Signature Verification problems. The two most widely used primitives of PKC are RSA and Elliptic Curve Cryptography. Elliptic Curve Cryptography (ECC) has emerged as a strong alternative to RSA due to its property of more security per key bit. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 3/22

  12. Motivation ECC scalar multiplication algorithm is mathematically secure against the ECDLP problem. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 4/22

  13. Motivation ECC scalar multiplication algorithm is mathematically secure against the ECDLP problem. However ECC algorithms once implemented, the implementations suffer from side-channel leakage such as power (EM) leakage, timing leakage, acoustic leakage etc. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 4/22

  14. Motivation ECC scalar multiplication algorithm is mathematically secure against the ECDLP problem. However ECC algorithms once implemented, the implementations suffer from side-channel leakage such as power (EM) leakage, timing leakage, acoustic leakage etc. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 4/22

  15. Motivation ECC scalar multiplication algorithm is mathematically secure against the ECDLP problem. However ECC algorithms once implemented, the implementations suffer from side-channel leakage such as power (EM) leakage, timing leakage, acoustic leakage etc. Ladder, Unified Algorithm, Atomic formula: Countermeasure against Simple Power Analysis 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 4/22

  16. Motivation ECC scalar multiplication algorithm is mathematically secure against the ECDLP problem. However ECC algorithms once implemented, the implementations suffer from side-channel leakage such as power (EM) leakage, timing leakage, acoustic leakage etc. Ladder, Unified Algorithm, Atomic formula: Countermeasure against Simple Power Analysis Scalar Blinding, Point Coordinate Randomization: Countermeasure against Differential Power Analysis 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 4/22

  17. Motivation Horizontal Attacks are special attacks which threatens a SPA as well as DPA resistant implementation. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 5/22

  18. Motivation Horizontal Attacks are special attacks which threatens a SPA as well as DPA resistant implementation. It involves few (single) number of traces to break the entire secret key. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 5/22

  19. Motivation Horizontal Attacks are special attacks which threatens a SPA as well as DPA resistant implementation. It involves few (single) number of traces to break the entire secret key. Thus imposes a serious threat to ECC implementations. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 5/22

  20. Horizontal Collision Correlation Analysis (HCCA) First seminal work in Horizontal Attacks was Big Mac Attack by Walter et. al. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 6/22

  21. Horizontal Collision Correlation Analysis (HCCA) First seminal work in Horizontal Attacks was Big Mac Attack by Walter et. al. Big Mac Analysis followed several flavors of Horizontal attacks on the RSA-based exponentiation algorithms. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 6/22

  22. Horizontal Collision Correlation Analysis (HCCA) First seminal work in Horizontal Attacks was Big Mac Attack by Walter et. al. Big Mac Analysis followed several flavors of Horizontal attacks on the RSA-based exponentiation algorithms. Horizontal Collision Correlation Analysis or HCCA by Bauer et. al. put forward the idea of Horizontal Attacks in case of elliptic curve cryptography. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 6/22

  23. Horizontal Collision Correlation Analysis (HCCA) First seminal work in Horizontal Attacks was Big Mac Attack by Walter et. al. Big Mac Analysis followed several flavors of Horizontal attacks on the RSA-based exponentiation algorithms. Horizontal Collision Correlation Analysis or HCCA by Bauer et. al. put forward the idea of Horizontal Attacks in case of elliptic curve cryptography. HCCA threatens an atomic scheme ECC algorithm or unified ECC algorithm (Edward curve) with SPA, DPA resistance. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 6/22

  24. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  25. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. It is based on the following assumption: The adversary can detect when a pair of field multiplications have at least one operand in common 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  26. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. It is based on the following assumption: The adversary can detect when a pair of field multiplications have at least one operand in common If A , B , C and D be field multiplications considered without loss of generality, then following pairs can be defined 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  27. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. It is based on the following assumption: The adversary can detect when a pair of field multiplications have at least one operand in common If A , B , C and D be field multiplications considered without loss of generality, then following pairs can be defined ( A × B , A × B ): sharing both operands 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  28. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. It is based on the following assumption: The adversary can detect when a pair of field multiplications have at least one operand in common If A , B , C and D be field multiplications considered without loss of generality, then following pairs can be defined ( A × B , A × B ): sharing both operands ( A × B , C × B ): sharing one operand 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  29. Horizontal Collision Correlation Analysis (HCCA) HCCA is based on underlying field multiplications that constitute ECC point addition and doubling. It is based on the following assumption: The adversary can detect when a pair of field multiplications have at least one operand in common If A , B , C and D be field multiplications considered without loss of generality, then following pairs can be defined ( A × B , A × B ): sharing both operands ( A × B , C × B ): sharing one operand ( A × B , C × D ): sharing no operand 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 7/22

  30. Horizontal Collision Correlation Analysis (HCCA) Following properties have been defined: 29 / 09 / 2017 Debapriya Basu Roy, Proofs-2017 8/22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend