Next Article in Journal
Development of a Soft Sensor for Flow Estimation in Water Supply Systems Using Artificial Neural Networks
Next Article in Special Issue
Memory Offloading for Remote Attestation of Multi-Service IoT Devices
Previous Article in Journal
Butterfly: μW Level ULP Sensor Nodes with High Task Throughput
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †

1
IHP—Leibniz-Institut für Innovative Mikroelektronik, 15236 Frankfurt, Germany
2
Brandenburg University of Technology Cottbus-Senftenberg, 03046 Cottbus, Germany
*
Author to whom correspondence should be addressed.
This paper is an extended version of our publication: Kabin, I.; Klann, D.; Dyka, Z.; Langendoerfer, P. Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021.
Sensors 2022, 22(8), 3083; https://doi.org/10.3390/s22083083
Submission received: 16 February 2022 / Revised: 1 April 2022 / Accepted: 6 April 2022 / Published: 18 April 2022

Abstract

:
Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed.

1. Introduction

Elliptic curve cryptography (ECC) is an asymmetric cryptographic approach proposed independently in 1985 by Neal Koblitz [1] and Victor S. Miller [2]. Elliptic curves are used in various fields of application. Many interesting details about ECC including its genesis can be found in [3]. The advantage of ECC in comparison to RSA [4] is the possibility to use significantly shorter keys than RSA by maintaining the same security strength. ECC is used to share secret keys, for signing messages and for authentication, which are essential when it comes to communication, e.g., in the fields of the Internet of Things and wearable sensors [5]. The main operation of ECC is the elliptic curve point multiplication kP, where P is a point of an elliptic curve (EC), and k is a scalar, also denoted as key. The length of the scalar depends on the type of EC used and on the security requirements. Currently, keys have to be about 200–300-bit long. There are two types of ECs standardized for use in cryptographic protocols: ECs over extended binary fields GF(2n), and ECs over prime fields GF(p). The kP operation is the most time- and energy-consuming operation in ECC protocols. The Montgomery kP algorithm (the Montgomery ladder) using Lopez–Dahab projective coordinates [6] is the algorithm most often used in hardware implementations for accelerating cryptographic operations for ECs over extended binary fields GF(2n) due to its fast execution time. It requires only six field multiplications for processing a key bit, whereby all other operations—field additions and squaring operations as well as register operations—can be implemented in parallel to field multiplications. For ECs over GF(p), no comparably fast algorithm is known. Usually, many more field multiplications have to be calculated. Additionally, mathematical operations—multiplications, additions and subtractions in prime fields—implemented in hardware are significantly slower than the mathematical operations in extended binary fields due to the delay caused by the carry bit propagation. For large networks or time-critical applications, a fast execution of cryptographic operations is essential. For automotive applications, at least 1000 signature verifications per second are required; in big cities, this number even reaches up to 4000. Corresponding to the Elliptic Curve Digital Signature Algorithm (ECDSA) [7], only one kP operation has to be calculated for a generation of a digital signature, but two kP operations have to be calculated for its verification. To fulfil the speed requirements, efficient methods have to be applied at each implementation level, i.e., field operations, kP operation and ECDSA acceleration. For example, the Straus–Shamir trick [8,9] is a well-known means to accelerate the signature verification for ECs over GF(p).
An additional requirement for applications that are sensitive to manipulations is that the implemented algorithms have to be resistant to side-channel analysis (SCA) attacks, if an attacker has physical access to the working cryptographic device. The goal of attackers is to reveal the scalar k processed during a kP execution. Many kP algorithms process the scalar k bitwise, i.e., bit-by-bit. The Montgomery kP algorithm for ECs over GF(2n) is known in the literature to be resistant against simple SCA attacks due to its regularity [10,11], i.e., the sequence of operations for the processing of the bit value “0” of the scalar k is the same as for the processing of the bit value “1”. Due to the fact that a point doubling and a point addition have to be calculated for processing each key bit in the main loop of the Montgomery ladder, the Montgomery kP algorithm can be considered a type of a double-and-add-always algorithm. In order to reduce the execution time of cryptographic operations, kP algorithms for ECs over GF(p) are often based on the binary double-and-add algorithm. In that case, the processing of the key bit “0” requires only a single point doubling calculation, but the processing of the key bit “1” requires two point operations—a point doubling and a point addition. The sequence of mathematical operations for a point doubling differs from that of a point addition. This results in a different energy consumption for each type of point operation, i.e., the power profile of a point doubling is distinguishable from the power profile of a point addition. If an attacker can measure the current drawn by the device or its electromagnetic emanation during a kP execution (hereafter kP trace), and the differences are observable by a visual inspection of the trace, the implementation is vulnerable to simple SCA attacks. To make the double-and-add algorithm resistant to simple SCA attacks, the sequence of the field operations for an EC point doubling has to be the same as the sequence of the field operations for an EC point addition: for example, using a unified point addition formula. Another strategy is the implementation of both point operations using a repeated (short) sequence of field operations. For example, a point doubling can be implemented as a sequence repeated 16 times containing “two additions, one additive inverse, one multiplication and four write-to-register operations”, and a point addition can be implemented as a sequence of the same operations repeated 10 times. This strategy was proposed in [12] and is known as the “atomicity” principle because the short operation sequence is denoted as an “atom”. In [13], longer atomic patterns were proposed for EC point doubling and addition, using special mixed Jacobian–affine coordinates. The point doubling as well as the point addition requires only 10 field multiplications, 10 field additions/subtractions and 21 write-to-register operations, i.e., this algorithm is also the fastest one (see Section 4 in [13]).
This paper is an extended version of the paper entitled “Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks” presented in 2021 at the IEEE International Conference on Cyber Security and Resilience (CSR) [14]. We implemented an elliptic curve point multiplication for the following four NIST elliptic curves [7]: B-233, B-283, P-224 and P-256, in hardware to accelerate the generation and verification of digital signatures. The following contributions are described in [14] and here:
  • Applying the four-segment iterative Karatsuba multiplication formula (MF) to both types of Galois fields. The multiplication formula was proposed and efficiently applied in [15] for accelerating the field multiplication in GF(2n). To the best of our knowledge, we are the first team to apply this formula to implement a dual-field multiplier. In comparison to the classical multiplication formula, the segmentation of multiplicands in four parts, the four-segment Karatsuba MF, is much faster: the product can be calculated in only nine clock cycles, which is seven clock cycles less than when applying the classical MF. It reduces the calculation time as well as the energy consumption of kP executions for ECs over GF(p) by about 40%. Thus, the automotive requirement to be able to perform 1000 signature verifications per second can be reached even with non-scaled technologies: for example, using a 250 nm gate library [16].
  • Evaluation of the resistance of the implemented four-EC design against horizontal address-bit differential power analysis (DPA) attacks using the comparison to the mean method [17]. Analyzing a kP power trace simulated for EC B-233 in the four-elliptic-curve design, we obtained only the two best key candidates with a correctness of about 87% and 85%, respectively. In comparison to this, attacking the single B-233 curve kP design resulted in six key candidates being obtained, with a correctness higher than 95%—so the resistance of the four-elliptic-curve design is significantly better than that of the single designs.
  • Verification of our assumption about the vulnerability of the atomic pattern algorithm [13] to horizontal SCA attacks. Analyzing power traces for EC P-224, we obtained four key candidates with a correctness of 97% or higher. Attacking EC P-256, we were able to reveal the key completely, i.e., three key candidates had a correctness of 100%.
For our implementation, we selected kP algorithms that are fast and mentioned in the literature as resistant against simple SCA attacks, due to the regularity and atomicity principles of the algorithms. More specifically, we selected the Montgomery ladder using projective Lopez–Dahab coordinates [6] for ECs over GF(2n), and the atomic pattern algorithm using mixed Jacobian–affine coordinates [13] for ECs over GF(p).
The vulnerability of the Montgomery ladder to horizontal address-bit DPA attacks is known [18]. The key-dependent addressing of registers or other blocks is “visible” even through simple statistical analysis of a single kP trace. The resistance of the atomic pattern algorithm [13] against horizontal address-bit DPA attacks has, to the best of our knowledge, not been evaluated yet. We assumed that the power profiles of point doublings and point additions, implemented corresponding to the atomic patterns described in [13], are distinguishable due to the key-dependent use of registers in these patterns. Thus, the algorithm [13] is, theoretically, vulnerable to horizontal address-bit DPA attacks, too. However, we expected that the resistance of our design for four ECs will be higher than that of a design for a single EC, due to the fact that some operations (for example, field reductions) are always performed for all four ECs in our design. This increases the energy consumption of the kP design, but it is a type of noise that can hide the key-dependent addressing of the registers. Our assumptions were confirmed.
Additionally, we extended our conference paper [14] with the following investigations:
  • We extended the evaluation of our design’s resistance against horizontal DPA attacks. We ported the design to an FPGA, captured electromagnetic traces of the kP execution, repeated our attack analyzing the measured traces and compared the attack results with those obtained by attacking the simulated traces of an ASIC. Despite the significant differences between the target platforms—a cryptographic ASIC in the IHP 250 nm technology and an FPGA in the 28 nm technology—the resistance of the cryptographic designs against horizontal DPA attacks is quite similar, i.e., the performed attack was successful.
  • We performed additional investigations by applying an automated simple analysis attack against the measured electromagnetic traces for the ECs P-224 and P-256. We discovered and demonstrated that the atomic patterns presented in [13] are vulnerable to simple analysis attacks.
  • We proposed an approach to reduce the success of simple analysis attacks, as well as horizontal attacks, and evaluated its effectiveness by attacking the electromagnetic traces of the modified design.
The rest of this paper is structured as follows. In Section 2, we focus on the implementation details of our unified design. The results of the horizontal DPA attacks performed against simulated power traces are presented and discussed in Section 3. Section 4 provides the results of a horizontal differential electromagnetic analysis performed against electromagnetic traces measured on an FPGA. In Section 5, we present the results of our automated simple analysis attack. An approach focused on reducing the success of horizontal attacks is presented and evaluated in Section 6. This paper ends with short conclusions.

2. Implementation Details

2.1. Accelerated Operations

In our hardware–software co-design for signature generation and verification corresponding to the ECDSA, we implemented elliptic curve point operations in hardware. We selected the following algorithms for the implementation:
  • The modified Montgomery kP algorithm using Lopez–Dahab projective coordinates as described in [19] for the acceleration of the kP operations using the ECs B-233 and B-283;
  • The double-and-add kP algorithm with atomic patterns using mixed Jacobian–affine coordinates for point doublings and point additions (see patterns reported in [13], Section 4.1) as the basis for our accelerator for the ECs P-224 and P-256. We applied the Straus–Shamir trick [8,9] as recommended in [13] for the calculation of uP + vQ. We slightly modified the sequence of operations presented in [13] with the goal to increase the pipelining of field operations.
Our kP implementation is a bitwise processing of the scalar k. The Straus–Shamir trick (see Algorithm A1 in Appendix A) allows for performing only one kP operation instead of two independent elliptic curve point multiplications, uP and vQ. The number of point doublings is unchanged, but the number of point additions is increased. This trick reduces the execution time of the (uP + vQ) calculation significantly.
Pipelining of the field operations in our implementation as well as the applied four-segment Karatsuba multiplication formula for realizing the dual-field multiplier reduces the execution time of each kP operation by about 40% compared to the classical multiplication method. The time reduction has a similar effect to applying the Straus–Shamir trick.
The algorithms selected for the kP implementation and the four-segment Karatsuba multiplication formula for both Galois fields are presented in Appendix A (see Algorithm A2 and Equation (A1)) to increase the readability of this paper. In the rest of this section, we present the implemented sequence of the field multiplications and explain the structure of our design and its blocks.

2.2. Implemented Sequences of Operations

Table 1 shows the operation sequence we implemented in the main loop of our kP design for ECs over GF(2n), corresponding to Algorithm A2 in Appendix A. In the main loop, a single key bit value ki of the scalar k is processed.
In our implementation, the main loop consists of a sequence of six field multiplications (denoted M1–M6), five field squaring operations (denoted Sq1–Sq5), three field additions (denoted Add1, Add2, Add3) and many write-to-register operations (denoted with “←”). The field addition is a bitwise XOR operation. The field squaring of an element A ( t ) = a n 1 t n 1 + a n 2 t n 2 + + a 1 t + a 0    GF(2n) with an irreducible polynomial f(t) can be performed as a multiplication with the same operands ( A ( t ) ) 2 = A ( t ) A ( t )   mod f ( t ) or, alternatively, corresponding to the following formula using the binary representation of A ( t ) = a n 1 a n 2 a 0 = i = 0 n 1 a 0 2 i :
( A ( t ) ) 2 = ( i = 0 n 1 a i 2 2 i ) mod f ( t ) = a n 1 0 a n 2 0 0 a 1 0 a 0   mod f ( t )
The squaring corresponding to (1) is an easy operation compared to a multiplication with the same operands. It requires only a single clock cycle, consumes much less energy and can be performed in parallel to other multiplications, accelerating the kP executions significantly. We realized the operation of the main loop using a field multiplier block, a field adder, a field “squarer” and only seven registers: X1, X2, Z1, Z2, X3, X4 and x. The register x contains the x-coordinate of the input point P. Please note that a and m in Table 1 are not physical registers. They are only variables that we use here to denote some intermediate values. In our implementation, all squaring operations, additions and write-to-register operations are realized in parallel to field multiplications. The operations performed in parallel are shown in the same cell in Table 1: for example, the squaring operations Sq1 and Sq2 and the multiplication M1.
The first field multiplication M1 in the current loop iteration depends on the key bit value that was processed in the previous iteration, i.e., it is either X1∙Z2 or X2∙Z1 in our design. This key-dependent selection of the operands for the first multiplication in the loop was originally introduced in [20] in 2008. Using this type of multiplication swap, the multiplier can start the calculation of the new product directly after the calculation of M6 because it does not need to wait for the new operands. Please note that the multiplier consumes much less energy during idle clock cycles. In such a case, the energy consumption of other blocks, for example, an adder performing addition Add3 and storing its results in the register, can be observed better. Using the multiplication swap, it is possible to perform addition Add3 and store its result in a register fully parallel to the last multiplication, M6. Thus, this parallelization not only reduces the execution time of the main loop but also increases the resistance of the implementation against SCA attacks.
Table 2 shows the operation sequence we implemented in our kP design for ECs over GF(p) based on Algorithm A3 in Appendix A. The processing of the key bit value ki = 0 requires only a single point doubling. The processing of the key bit value ki = 1 requires two point operations—a point doubling and a point addition. In Algorithm A3, a subtraction is performed after the first field multiplication, and after these two operations, an addition of the field elements is executed. In our implementation, we performed the addition before the subtraction, in parallel to the first multiplication. Operations performed in parallel are shown in the same row in Table 2.
The field operations in GF(p) require more gates when implemented in hardware and are slow compared to operations in GF(2n). This is due to the carry bit propagation and the more complex reduction. We implemented squaring operations as multiplications with the same operands. The sequence of operations in our design for point doublings as well as for point additions consists of 10 field multiplications, 10 additions (subtractions) and write-to-register operations. Thus, we realized the operation flow presented in Table 2 using a field multiplier block, a field adder and 12 registers: X1, X2, X3, Z1, Z2; X, Y, Zq; and R0, R1, R2, R3. The registers X and Y contain the coordinates of the input point P and will be not written but only read during the point doublings as well as during the point additions.

2.3. Structure of Our Design

The operations listed in Table 1 and Table 2 define the structure of our kP design. It consists of:
  • A dual-field multiplier, denoted as MULT, that can calculate a field product for each of the four selected ECs, i.e., B-233, B-283, P-224 and P-256;
  • An ALU block for addition/subtraction in both GF(p) fields as well as for addition and squaring operations in both GF(2n) fields;
  • Registers for storing the inputs, outputs and intermediate data;
  • A Controller that manages the data flow between the design components and defines which operation has to be performed in the current clock cycle, including storing the data in registers as well as reading the data from the registers, ALU and multiplier;
  • A BUS that implements the data exchange between the blocks and the registers corresponding to the Controller signals.
The structure of our design is illustrated in Figure 1.
The BUS is implemented as a multiplexer consisting of many logic gates that react on the address given by the Controller. All blocks including the registers can write their outputs to the BUS. Only one of the blocks can write its output data to the BUS in a certain clock cycle, but many blocks can read data from the bus at the same time. The write-to-BUS operation from the Controller connects the output of the source block to the inputs of all other blocks. By the read-from-BUS operation, only the destination block accepts the values on its input as data for processing.
Reading data from the BUS and storing the data in a register require two clock cycles to be performed:
  • In the first clock cycle, the data are written to the BUS, whereby the selected register (or the other selected design block) obtains the signal we (word enable) from the Controller. The green rectangle in Figure 1 indicates the addressing of the registers, ALU and MULT blocks.
  • In the second clock cycle, the data are stored in the previously addressed register or in an internal register of a previously addressed block; data storing is denoted with a small gray rectangle in Figure 1.
The block ALU can perform different operations depending on the Controller signals as follows:
  • Reading data from the BUS (green rectangle); the data will be stored in the internal register (gray rectangle in the block ALU).
  • Squaring of GF(2n) elements (marked by yellow rectangles).
  • Addition of field elements (marked by dark blue rectangles) in prime or binary extended fields.
  • Subtraction of GF(p) elements (marked by magenta rectangles).
  • Writing data to the BUS.
The block MULT performs a field multiplication for one of the four ECs. Depending on the signals from the Controller, the MULT block:
  • Obtains two multiplicands: reading data from the BUS (see the two green rectangles) and storing the operand values in an internal register (see the two gray rectangles in block MULT). This requires two clock cycles.
  • Calculates partial products according to the four-segment Karatsuba multiplication formula (see Equation (A1) in Appendix A), accumulates the partial products in its internal register and performs a field reduction. In each clock cycle, a single partial product will be calculated. Corresponding clock cycles are marked with a red rectangle. The reduction in the intermediate product value is also performed in each clock cycle, after the accumulation of the currently calculated partial product. This increases the energy consumption of the field multiplier slightly but also partially hides the key-dependent activity/addressing of other design blocks. Due to the applied four-segment Karatsuba multiplication formula, nine different partial products have to be calculated, i.e., the field multiplier needs nine clock cycles for the accumulation of a field product.
  • Writes the calculated field product to the BUS directly after the nine partial products are accumulated.
  • Stalls, i.e., calculates a partial product of two zero operands. During the calculation of the first such partial product directly after the processing of non-zero operands, the multiplier consumes a slightly reduced energy (this clock cycle is marked by light red). The energy consumption of the multiplier is small while stalling. We marked such clock cycles by the white color.
We implemented the partial multiplier in our MULT block using the classical multiplication formula, with the goal to reach the maximal operation frequency.
Figure 2 shows the processing sequence in the main loop of our implementation for ECs over GF(2n), providing details about the activities of each block. Due to the structure of our design and the high level of pipelining achieved, the key bit processing requires only 54 clock cycles and is always performed using the same operation sequence, i.e., it is a regular processing of key bits. This operation sequence can be regarded as a type of “atom”, too.
Figure 3 shows the operation sequence for a point doubling and a point addition in our implementation for ECs over GF(p), providing details about the activities of each block.
For point additions using mixed Jacobian–affine coordinates [13], the atomic patterns do not allow such a high level of parallelization and pipelining. Even in our slightly modified sequence of operations, the addition Add3 and the subtractions Add2, Add7, Add8 and Add9 can be performed only between multiplications. Due to the realized pipelining and the fast field multiplier, a single atomic pattern—a point doubling or a point addition—requires only 109 clock cycles. Thus, the key bit value “0”, which requires only a point doubling, can be processed in 109 clock cycles. The processing of the key bit value “1” requires two atomic patterns (a point doubling and a point addition), i.e., it requires 2 × 109 = 218 clock cycles. Please note that a design that uses the classical multiplication method instead of the four-segment Karatsuba multiplication formula would require 179 clock cycles for an atomic pattern. Thus, the use of the four-segment Karatsuba multiplication formula reduces the execution time of a single atomic pattern by about 40%, whereby the maximal frequency, determined by the longest signal propagation path of the partial multiplier and the reduction unit, is the same.
In the next section, we explain how we performed horizontal DPA attacks. The details about the structure and the activity of the design blocks presented here are important for understanding the attack results and the reasons why the horizontal address-bit SCA attacks were successful.

3. Horizontal DPA Attack: Analysis of Simulated Traces

3.1. Power Trace Simulation

We synthesized our ECDSA accelerator for the IHP 250 nm technology. We used the Very High Speed Integrated Circuit Hardware Description Language (VHDL) for the behavioral modeling of our design and synthesized it using the Synopsys Design Compiler Version K-2015.06-SP2. The maximum achieved clock frequency was 62.5 MHz (16 ns clock cycle period) after synthesis. For each of the four ECs, we generated power traces of a kP execution using Synopsys PrimePower Version Q-2019.12-SP1. The PrimePower tool uses the gate-level simulation activity stored in the activity file to estimate the averaged power consumption of the design. It can also precisely analyze the power consumption of the design for each clock cycle within a given time interval, i.e., it allows simulating a power trace of kP executions, with the given inputs. Power traces were simulated with a step of 0.01 ns, i.e., our trace contains 1600 simulated values per clock cycle. We do not need such a fine-grained simulation for the experiments described in this work. To simplify the analysis, and due to the fact that the simulated trace is noiseless, we performed a trace compression. For each clock cycle, we calculated the sum of its sampling values and represented it using this single value (i.e., the y-axis shows the average power consumption in W, multiplied by 1600). Figure 4 shows parts of the compressed power traces simulated for the ECs B-233 and B-283. The parts shown correspond to the processing of two key bits, i.e., “01”.
Figure 5 shows parts of the compressed power traces simulated for the ECs P-224 and P-256. The shown parts also correspond to the processing of two key bits “01”, i.e., here, three atomic patterns are shown: two point doublings, and a point addition.
The clock cycles with reduced energy consumption are easy to see in Figure 5. As described above, the non-active field multiplier is the reason for the reduced energy consumption. These clock cycles are a type of marker. They “show” the periodicity of an atomic pattern. The knowledge about the period of atomic patterns is helpful for the preparation of different attacks. In comparison to the atomic patterns for the point operations in GF(p), the atomic patterns corresponding to the processing of a key bit in GF(2n) do not have such a type of marker in our implementation.
Please note that all traces shown in Figure 4 and Figure 5 are already compressed power traces, i.e., the row traces—the simulated power traces—were already partially prepared for the analysis.

3.2. Horizontal Power Analysis Attack

In this paper, we concentrated on single-trace attacks that are also known as horizontal attacks. In our horizontal attacks, we did not exploit any key-dependent correlations based on the processing of the same/different data as in horizontal correlation analysis attacks [21], or the storing of data in registers as in template attacks [22]. Our attack did not exploit the key-dependent data flow. The attack was based on the assumption that key-dependent addressing of different registers or other blocks of a cryptographic design is distinguishable. This assumption was exploited in [23] in 2002 for revealing a key using 1000 kP traces, i.e., it was a successful vertical attack. Since 2017, successful horizontal attacks exploiting key-dependent addressing of the Montgomery ladder for ECs over GF(2n) have been reported [18]. In detail, the following points were assumed as the basis of these attacks:
  • The attacked design processes a secret binary number k = kn−1kn−2k1k0 bitwise;
  • The addressing of the design blocks for processing the key bit value “0” differs from the addressing of the design blocks for processing the key bit value “1”;
  • The key-dependent addressing of the design blocks makes the shapes of the processing of the key bit value “0” distinguishable from the shapes of the processing of the key bit value “1”;
  • The differences in the shapes can be detected using statistical analysis methods or unsupervised machine learning algorithms.
Simple SCA attacks are successful if the power profiles of “0” key bits differ significantly from the power profiles of “1” key bits. These strong differences are often caused by the different sequences of mathematical operations in the main loop of the kP algorithm during the processing of “0” and “1” key bit values. These differences can be detected by visual inspection of the simulated or measured traces. Designs with the same sequence of operations for the processing of different key bit values—regular designs—are considered as resistant against simple SCA attacks. The differences caused by the key-dependent addressing of blocks are no longer significant, but they can still be “seen” using statistical analysis as a type of “magnifying glass”. Here, we performed an analysis using the comparison to the mean approach corresponding to [17].
In this work, we have two types of atomic patterns:
  • Atomic patterns for a point doubling or a point addition for ECs over GF(p);
  • Atomic patterns for the processing a key bit in the main loop of the kP algorithm for ECs over GF(2n).
Due to the duration of an atomic pattern (in clock cycles) and the compression of the power trace (only a single value represents each clock cycle), the power profile of an atomic pattern consists of:
  • One hundred and nine sample values for ECs over GF(p);
  • Fifty-four sample values for ECs over GF(2n).
We denote the current sample in an atomic pattern power profile (hereafter atomic profile) using the letter j in this work. Thus, for an atomic pattern:
  • For ECs over GF(p), j ∈ {1, 2, …, 109};
  • For ECs over GF(2n), j ∈ {1, 2, …, 54}.
We numbered each power profile of the processing of key bit ki in the main loop of the implemented algorithm using the same index letter i. Please note that in the main loop in our implementation for ECs over GF(2n), the key bits kl−3, kl−4,…, k1, k0 are processed, i.e., i∈{l−3, l−2,…, 1,0}, and for ECs over GF(p), i∈{l−2, l−1,…, 1,0}.
For the simulated, compressed kP traces of ECs B-233 and B-283, we:
  • Calculated the mean atomic profile averaging all atomic profiles.
  • Compared the value of the sample number 1 in the mean atomic profile with the sample number 1 in the ith atomic pattern profile, for all i in the analyzed trace:
    If the value of the sample number 1 in the ith atomic pattern profile was higher or equal to that in the mean atomic profile, we assumed that the key bit value ki = “1” was processed; otherwise, we assumed that the key bit value ki = “0” was processed.
    Therefore, we made an assumption about all l2 bits of key candidate 1, i.e., we extracted key_candidate_1.
  • Repeated the comparison for each of the remaining j sample numbers in order to extract the corresponding key_candidate_j.
  • Evaluated the correctness of the extracted key candidates, i.e., we compared each key_candidate_j with the scalar k processed in the analyzed kP execution. The result of the comparison is the relative number of correctly revealed key bits. For example, if 200 bits of a key candidate were revealed correctly and the scalar k processed was 233-bit long, the correctness δ = (200/233)⸱100% ≈ 85.8%.
We analyzed the kP traces for ECs P-224 and P-256 in a similar way. We calculated the mean power profile of point operations performed in the main loop of the kP executions for ECs P-224 and P-256. The mean profile contains 109 samples—one sample per clock cycle. We compared the mean profile of the point operation calculated for a kP execution with each point operation profile in the kP execution trace sample-wise. Using the mean atomic profile, we made an assumption about the point operations, i.e., we distinguished point additions and point doublings. Each point doubling profile followed by a point addition profile was denoted as a processed key bit value of “1”, corresponding to the implemented double-and-add algorithm. For the evaluation of each extracted key candidate, we calculated its correctness as described above.
Thus, for each kP trace analyzed for ECs over GF(p), we extracted 109 key candidates, and for ECs over GF(2n), we extracted 54 key candidates.
Please note that if the correctness of a key candidate is less than 50%, it means that our assumption about the processed key bit value was wrong. Bitwise inversion of the key candidate gives us the key candidate, for which the correctness is (100% − δ) > 50%.
Figure 6a shows the attack results for the ECs B-233 and B-283, and Figure 6b shows the attack results for the ECs P-224 and P-256.
The results of our attacks demonstrate that the atomicity patterns do not prevent horizontal attacks from being successful. On attacking EC P-224, we obtained four key candidates with a correctness higher than 97% (see key candidates 13, 25, 86 and 109). On attacking EC P-256, we fully revealed the key (see key candidates 13, 25 and 109 with a correctness of 100%). Well-known randomization techniques such as secret scalar randomization, randomization of the projective EC point coordinates or EC point blinding [24] are effective against vertical attacks, i.e., if key-dependent data processing is exploited to extract the key. However, they are not effective [25,26] against attacks exploiting the key-dependent addressing of the design blocks, i.e., their application when using atomic patterns does not prevent horizontal attacks that exploit the addressing from being successful. In other words, they do not prevent simple SCA attacks that are looking for highly fine-grained differences in the trace. The weak point of the atomicity principle is the assumption that the addressing of different registers (or other blocks of the design) is indistinguishable. The same weak point cryptographic designs have when implementing the regularity principle as a countermeasure against simple SCA attacks. This does not hold true if the design is a hardware implementation. Therefore, approaches for hiding the addressing have to be applied in addition. One of the well-known approaches is adding noise. The activity of design blocks is a type of noise. Figure 7 demonstrates how the activity of the blocks in our four-curve design decreased the success of the same attack performed analyzing a kP trace recorded when only the EC B-233 kP design was active. In the case of the single EC B-233 kP design, we obtained 12 key candidates with a correctness higher than 85%, whereby 6 of the 12 key candidates had a correctness higher than 95% (see red line in Figure 7). In the case of the four-active-EC design, only two key candidates had a correctness of about 85%, whereby the correctness of the best key candidate was 87% (see blue line in Figure 7).

4. Horizontal DPA Attack: Evaluation of an FPGA Implementation

We ported our design to an FPGA with the goal to confirm the conducted investigations on a real device. As the target platform, we took an Arty Z7-20 development board (Figure 8a) equipped with a Xilinx 7-series FPGA produced in a 28 nm technology. The attacked FPGA is marked with a circle in Figure 8.
Table 3 shows the FPGA resources used by the whole design as well as its multiplier block.
The maximum operating frequency for the design is slightly above 25 MHz. However, we applied a clock frequency of 10 MHz to increase the number of captured samples per clock cycle during the collection of kP traces.
The board used is not suitable for the connection of a current probe. Therefore, instead of measuring the power traces that require a board modification, we applied a near-field magnetic probe to capture electromagnetic traces. The electromagnetic traces were captured during the execution of kP operations at a 10 GS/s sampling rate by a LeCroy WavePro 254HD oscilloscope and a Langer MFA-R 0.2-75 [27] near-field probe connected to it. We placed the MFA-R probe close to one of the power decoupling capacitors. The exact location of the probe is shown in Figure 8b.
We repeated our comparison to the mean attack against measured traces of the kP execution as described in Section 3. All the design inputs for the kP operations, i.e., coordinates of the EC points as well as scalars for each of the curves, were kept the same as those used during the simulations of the power traces. Figure 9a shows the attack results for the ECs B-233 and B-283, and Figure 9b shows the attack results for the ECs P-224 and P-256.
On attacking EC P-224, we obtained four key candidates with a correctness of 100%, i.e., we fully revealed the key (see key candidates 13, 73, 86 and 87). On attacking EC P-256, we obtained five key candidates (clock cycles 13, 73, 86, 87 and 89) that are identical to the processed key.
Table 4 summarizes the results of the comparison to the mean attack performed against the simulated power traces and measured electromagnetic traces of the kP executions for the four investigated curves.
As it can be seen from Table 4, despite the significant difference between the target platforms used for the simulation and measurements of the traces (i.e., ASIC and FPGA), the results are quite similar. For the binary elliptic curves investigated here, there were no key candidates revealed with a correctness of more than 90% using the traces simulated for the ASIC as well as using the traces measured on the FPGA. In contrast to this, for the investigated elliptic curves over prime fields, the results obtained using the measured traces are far worse than for the simulated traces. The number of key candidates extracted with a correctness of more than 90% increased from 6 and 7 for ECs P-224 and P-256, respectively, to 18 and 20.

5. Automated Simple Analysis Attack

We decided to investigate our design further by analyzing the uncompressed measured traces of the elliptic curves P-224 and P-256. Analysis of uncompressed traces can provide advantages to designers for determining the leakage sources as well as attackers when revealing the key. If the leakage source is not very high/strong, or if the leakage duration is short in comparison to that of the clock cycle, the compression can “hide” this leakage, at least partially.
The main purpose of the atomicity principle is to protect elliptic curve scalar multiplication against simple side-channel analysis attacks. Therefore, we applied an automated simple analysis attack against measured traces as described in [28], i.e., we tried to distinguish the point doubling atomic pattern from that of the point addition using our software that helps to detect tiny differences in a similar way to a magnifying glass.
As already mentioned before, the design was run at a 10 MHz clock frequency, and the traces were captured by an oscilloscope at a 10 GS/s sampling rate. These parameters resulted in 1000 measured samples per clock cycle. Hence, a single atomic pattern, consisting of 109 clock cycles in our implementation, is represented by 109,000 values within the measured trace.
In total, for each of the traces, out of 109,000 samples in the atomic pattern, we identified 994 samples for EC P-224 and 1122 samples for EC P-256 that allow for successfully revealing the processed scalar using simple visual inspection. Detailed information about the distribution of such samples within the atomic pattern as well as visualization of such data is presented in Table 5 and Figure 10.
Taking into account the information presented in Figure 3 and Figure 10, it is obvious that all the significant leakage comes from the clock cycles of the atomic pattern in which the multiplier block is not active. The multiplier’s inactivity results in a significant reduction in the energy consumed. Thus, the “contribution” of the other blocks to the energy consumption of the whole design becomes more “visible”.
We use an example of the electromagnetic trace for EC P-224 to visualize the difference between the shapes of the point doubling and point addition atomic patterns, indicated by I–IV (see Figure 11a). Parts I–IV are depicted—zoomed in—in Figure 11b–e. The shapes of point additions and point doublings are represented by magenta and green areas, respectively.
As it can be seen in Figure 11 and Figure 12, the four regions with an inactive multiplier differ significantly in the level of the SCA leakage. Please note that the figures have different y-axis scales. The most “visible” leakage is located in the 13th clock cycle of the atomic pattern (see Figure 11b and Figure 12b). The green and magenta shapes are completely separated from one another in most of the points for the x-axis values in the range between 12,000 and 13,000. The leakage in clock cycle 24 is almost “invisible” as there is only a small separation for the x-range between 23,330 and 23,380 in Figure 11c and close to the sample number 23,320 in Figure 12c. From the designers’ point of view, the best case in terms of resistance against simple analysis attacks corresponds to the completely gray areas (i.e., the overlapping one), where the operation execution profiles cannot be distinguished from each other.
The multiplier is a big block of our kP design. As it can be seen from Table 3, it consumes all the DSP blocks, almost half of the LUTs (49.94%) and 21.92% of flip-flops required by the whole design. Its energy consumption is high in comparison to other design blocks. Thus, the activity of the multiplier is a type of noise that can hide the activity of other blocks. In the next section, we demonstrate how the multiplier’s activity can reduce the success of horizontal attacks as well as simple analysis attacks as a particular case.
Figure 12 shows the difference between the shapes of atomic patterns, i.e., point doublings and point additions, for the electromagnetic trace of the EC P-256 kP execution.

6. Influence of Dummy Partial Multiplications on the Design Resistance

In our recent works [29,30,31], we investigated the influence of the activity of different field multipliers on the resistance of kP designs against horizontal SCA attacks. In [29], we investigated the application of the dummy activity of the multiplier as a means to reduce the vulnerability of our hardware accelerator for a single EC, P-256, to horizontal attacks. For this investigation, the design was derived from our unified four-curve ECDSA accelerator described here. Therefore, we assume that this approach should affect the unified design in a similar way.
We modified our unified design by adding the execution of dummy partial multiplications in clock cycles where the multiplier block was not active before. The design was ported to the same FPGA, and the resource utilization is presented in Table 6.
In comparison to the original design (see Table 3), the modification introduced an overhead of about 1.3% in terms of LUT utilization. The most affected block is the multiplier, which was increased by 459 LUTs.
We measured four electromagnetic kP traces on the modified design using the same inputs as in the previous experiments. We performed the comparison to the mean attack against each of the measured traces. For the B-233 and B-283 elliptic curves, the attack results are practically the same with a marginal difference. The attack results for the P-224 and P-256 elliptic curves are presented in Figure 13 and compared with the original design, i.e., the design without the dummy activity of the field multiplier.
As it can be seen in Figure 13, the correctness of the key candidates for most of the clock cycles in the atomic pattern regions where the multiplier was not active, i.e., clock cycles 11 to 13, 24, 71 to 75 and 86 to 91 (see black dotted and orange lines), significantly dropped down (see violet and brown lines).
The number of key candidates for EC P-224 revealed with a correctness of more than 90% dropped down from 18 to 10 in comparison to the original design, while the best key candidate had a correctness of 97.49%. For EC P-256, the number of key candidates with a correctness of more than 90% dropped down from 20 to 9. The best key candidate had a correctness of 95.78%. Thus, the application of dummy partial multiplications reduced the success of the comparison to the mean attack.
Additionally, we repeated the simple analysis attack against the design with dummy partial multiplications using traces of the P-224 and P-256 kP executions. As a result, we discovered 17 out of 109,000 samples that allow revealing the full key for the P-224 trace only. All “leaky” samples were located in clock cycle 13 of the atomic pattern.
The number of samples that allow revealing the full key decreased from 994 down to 17 samples for EC P-224 and from 1122 to 0 samples for EC P-256.
The differences in the shapes of the point doublings and point additions are demonstrated in Figure 14a,b for clock cycle 13 of the atomic pattern for P-224 and P-256, respectively.

7. Conclusions

In this paper, we focused on the side-channel analysis attack resistance of our design supporting four different elliptic curves, two B-curves over GF(2n) and two P-curves over GF(p). We used the four-segment Karatsuba multiplication formula for implementing a dual-field multiplier in our design, reducing the execution time of kP calculations by about 40% in comparison to the classical multiplication formula. Please note that the implementation of the P-curves employs atomic patterns that are considered as a means to render simple side-channel analysis attacks void. However, in this paper, we could show that the application of the atomic patterns introduced in [13] is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks, which are single-trace attacks. The source of the leakage is related to the key-dependent addressing of design blocks/registers in the atomic patterns, i.e., the assumption about the indistinguishability of the addressing of the design blocks/registers has to be revised. We could show that noise produced by the activity of the field multiplier can reduce the success of attacks applied and therefore increase the inherent resistance of the whole design. Designers have to be aware of such details and avoid a straightforward implementation of cryptographic algorithms that may result in a design vulnerable even to simple SCA attacks.

Author Contributions

Conceptualization, I.K., Z.D. and P.L.; data curation, I.K.; formal analysis, I.K.; funding acquisition, Z.D. and P.L.; investigation, I.K.; methodology, I.K. and Z.D.; project administration, P.L.; resources, I.K. and Z.D.; software, I.K.; supervision, Z.D. and P.L.; validation, I.K. and Z.D.; visualization, I.K.; writing—original draft, I.K.; writing—review and editing, I.K., Z.D. and P.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank Dan Klann for his support in the design implementation.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Algorithm A1: Calculation of uP + v·Q using the Straus–Shamir trick.
Input: u = (ul−1u1 u0)2, v = (vl−1v1 v0)2 with (ul−1,vl−1) (0,0);
P, Q are points of EC over GF(p), P ≠ Q
Output: R = u∙P +Q
Precompute: W = P + Q
R= ul−1·P+ vl−1 ·Q
forifroml − 2downto0do
  R = 2·R
  if ui = 1 and vi = 1 then R = R + W
   else if ui = 1 and vi  = 0 then R = R + P
     else if ui = 0 and vi = 1 then R = R + Q
end for
return R
Algorithm A2: Montgomery ladder using projective Lopez–Dahab coordinates.
Input: k = (kl−1k1 k0)2 with kl−1 = 1, P = (x,y) is a point of EC over GF(2l)
Output: kP = (x1, y1)
initialization
1: X1 ← x, X2 ← x4 + b, Z2 ← x2
processing the second most significant bit
2: ifkl−2 = 1 then
3:  T ← Z2, Z1 (X1Z2 + X2)2,
X1 ← X1Z2X2 + xZ1,
4:  T ← X2, U ← b Z24, X2 ← X24+ U,
U ← TZ2, Z2 ← U 2.
5: else
6:  T ← Z2, Z2 (X1Z2 + X2)2,
X2 ← X1X2T + xZ2,
7:  T ← X1, U ← bX24, X1 ← X14 + b,
U ← TX2, Z1 ← T2.
8: end if
main loop
9: forifroml − 3downto0do
10:  ifki = 1then
11:   T ← Z1, Z1 (X1Z2 + X2Z1)2, X1 ← xZ1 + X1X2TZ2,
12:   T ← X2, X2 ← X24 + bZ24, Z2 ← T2 Z22.
13:  else
14:   T ← Z2, Z2 (X2Z1 + X1Z2)2, X2 ← xZ2 + X1X2TZ1,
15:   T ← X1, X1 ← X14 + b Z14, Z1 ← T2 Z12.
16:  end if
17: end for
end of the main loop
calculating affine coordinates of the kP result
18: x1 ← 1/(xZ1Z2)
19: y1 ← y + (x + x1)[(X1 + xZ1)(X2 + xZ2) + (x2 + y)(Z1Z2)] ∙ x1
20: x1 ← X1x1xZ2//i.e., x1 = X1/Z1
21: return (x1, y1)
Algorithm A3:Atomic patterns using special mixed Jacobian–affine coordinates for EC point addition and doubling for ECs over GF(p) with the parameter a = −3, corresponding to [13].
Nrpoint additionpoint doubling
1R1 ←Xq ∙ Z2R0 ← I ∙ Z2
2R1 ← R1 − XR1 ← X − R0
3  +R2 ← Y + Y
4R2 ← R1 ∙ R1Z22 ← Y ∙ R2
5  +Y2 ← Z22 + Z22
6R3 ← X ∙ R2R3 ← R2 ∙ Z
7R0 ←Yq ∙ Z3R2 ←Y2 ∙ X
8  +X2 ← X + R0
9Z3 ←R1 ∙ R2R0 ←R1 ∙ X2
10R2 ← Z ∙ R1R1 ← Z22 ∙ Y2
11X3 ←R3 + R3X2 ← R0 + R0
12X3 ← Z3 + X3R0 ← R0 + X2
13Z32 ←(R2)2X2 ← (R0)2
14R0 ← R0 − YX2 ← X2 − R2
15R1 ←(R0)2Z22 ← (R3)2
16X3 ←R1 − X3X2 ← X2 − R2
17R1 ←R3 − X3R2 ← R2 − X2
18R3 ← R1 ∙ R0Z23 ← Z22 ∙ R3
19R0 ← Y ∙ Z3Y2 ← R0 ∙ R2
20Y3 ←R3 − R0Y2 ← Y2 − R1
21Z3 ← R2Z2 ← R3
Equation (A1): Four-segment Karatsuba multiplication formula (m is the length of a segment).
A × B = ( A 3 A 2 A 1 A 0 ) × ( B 3 B 2 B 1 B 0 ) = = ( A 3 × 2 3 m + A 2 × 2 2 m + A 1 × 2 1 m + A 0 ) × ( B 3 × 2 3 m + B 2 × 2 2 m + B 1 × 2 1 m + B 0 ) = = A 0 B 0 × 2 0 + ( - A 0 B 0 - A 1 B 1 + ( A 0 + A 1 ) ( B 0 + B 1 ) ) × 2 1 m + + ( - A 0 B 0 + A 1 B 1 - A 2 B 2 + ( A 0 + A 2 ) ( B 0 + B 2 ) ) × 2 2 m + + ( A 0 B 0 + A 1 B 1 + A 2 B 2 + A 3 B 3 - ( A 0 + A 2 ) ( B 0 + B 2 ) - - ( A 0 + A 1 ) ( B 0 + B 1 ) - ( A 1 + A 3 ) ( B 1 + B 3 ) - - ( A 2 + A 3 ) ( B 2 + B 3 ) + + ( A 0 + A 1 + A 2 + A 3 ) ( B 0 + B 1 + B 2 + B 3 ) ) × 2 3 m + + ( - A 1 B 1 + A 2 B 2 - A 3 B 3 + ( A 1 + A 3 ) ( B 1 + B 3 ) ) × 2 4 m + + ( - A 2 B 2 - A 3 B 3 + ( A 2 + A 3 ) ( B 2 + B 3 ) ) × 2 5 m + + A 3 B 3 × 2 6 m
Figure A1. Atomic pattern shapes of the EMT trace for EC P-224 with a design with dummy partial multiplications.
Figure A1. Atomic pattern shapes of the EMT trace for EC P-224 with a design with dummy partial multiplications.
Sensors 22 03083 g0a1

References

  1. Koblitz, N. Elliptic Curve Cryptosystems. Math. Comp. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  2. Miller, V.S. Use of Elliptic Curves in Cryptography. In Advances in Cryptology—CRYPTO ’85 Proceedings; Williams, H.C., Ed.; Springer: Berlin, Heidelberg, 1986; pp. 417–426. [Google Scholar]
  3. Koblitz, A.H.; Koblitz, N.; Menezes, A. Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift. J. Number Theory 2011, 131, 781–814. [Google Scholar] [CrossRef] [Green Version]
  4. Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  5. Sklavos, N.; Zaharakis, I.D.; Kameas, A.; Kalapodi, A. Security Amp; Trusted Devices in the Context of Internet of Things (IoT). In Proceedings of the 2017 Euromicro Conference on Digital System Design (DSD), Vienna, Austria, 30 August–1 September 2017; pp. 502–509. [Google Scholar]
  6. López, J.; Dahab, R. Fast Multiplication on Elliptic Curves Over GF(2m) without Precomputation. In Cryptographic Hardware and Embedded Systems; Koç, Ç.K., Paar, C., Eds.; Springer: Berlin, Heidelberg, 1999; Volume 1717, pp. 316–327. ISBN 978-3-540-66646-2. [Google Scholar]
  7. Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard; Request for Comments on the NIST-Recommended Elliptic Curves 2015. Available online: https://doi.org/10.6028/NIST.FIPS.186-4 (accessed on 14 April 2022).
  8. Bellman, R.; Straus, E.G. Addition Chains of Vectors (Problem 5125). Am. Math. Mon. 1964, 71, 806–808. [Google Scholar] [CrossRef]
  9. Elgamal, T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
  10. Joye, M.; Yen, S.-M. The Montgomery Powering Ladder. In Cryptographic Hardware and Embedded Systems—CHES 2002; Springer: Berlin, Heidelberg, 2002; pp. 291–302. [Google Scholar]
  11. Fan, J.; Guo, X.; De Mulder, E.; Schaumont, P.; Preneel, B.; Verbauwhede, I. State-of-the-Art of Secure ECC Implementations: A Survey on Known Side-Channel Attacks and Countermeasures. In Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, USA, 13–14 June 2010; pp. 76–87. [Google Scholar]
  12. Chevallier-Mames, B.; Ciet, M.; Joye, M. Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Trans. Comput. 2004, 53, 760–768. [Google Scholar] [CrossRef]
  13. Rondepierre, F. Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. In Smart Card Research and Advanced Applications; Springer: Cham, Switzerland, 2013; pp. 171–186. [Google Scholar]
  14. Kabin, I.; Klann, D.; Dyka, Z.; Langendoerfer, P. Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; pp. 273–280. [Google Scholar]
  15. Dyka, Z.; Langendoerfer, P. Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method. In Proceedings of the Design, Automation and Test in Europe, Munich, Germany, 7–11 March 2005; Volume 3, pp. 70–75. [Google Scholar] [CrossRef] [Green Version]
  16. IHP GmbH 0.25nm Technology. Available online: https://www.ihp-microelectronics.com/en/services/mpw-prototyping/sigec-bicmos-technologie (accessed on 14 April 2022).
  17. Kabin, I.; Dyka, Z.; Klann, D.; Langendoerfer, P. Horizontal Attacks Against ECC: From Simulations to ASIC. In Computer Security; Fournaris, A.P., Athanatos, M., Lampropoulos, K., Ioannidis, S., Hatzivasilis, G., Damiani, E., Abie, H., Ranise, S., Verderame, L., Siena, A., et al., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 64–76. [Google Scholar]
  18. Kabin, I.; Dyka, Z.; Kreiser, D.; Langendoerfer, P. Horizontal Address-Bit DPA against Montgomery KP Implementation. In Proceedings of the 2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico, 4–6 December 2017; pp. 1–8. [Google Scholar]
  19. Dyka, Z.; Bock, E.A.; Kabin, I.; Langendoerfer, P. Inherent Resistance of Efficient ECC Designs against SCA Attacks. In Proceedings of the 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus, 21–23 November 2016; pp. 1–5. [Google Scholar]
  20. Ansari, B.; Hasan, M.A. High-Performance Architecture of Elliptic Curve Scalar Multiplication. IEEE Trans. Comput. 2008, 57, 1443–1453. [Google Scholar] [CrossRef] [Green Version]
  21. Bauer, A.; Jaulmes, E.; Prouff, E.; Wild, J. Horizontal Collision Correlation Attack on Elliptic Curves. In Selected Areas in Cryptography—SAC 2013; Springer: Berlin, Heidelberg, 2013; pp. 553–570. [Google Scholar]
  22. Sakamoto, H.; Li, Y.; Ohta, K.; Sakiyama, K. Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems. In Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, Nara, Japan, 28 September 2011; pp. 11–20. [Google Scholar]
  23. Itoh, K.; Izu, T.; Takenaka, M. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2002; Springer: Berlin, Heidelberg, 2002; pp. 129–143. [Google Scholar]
  24. Coron, J.-S. Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems; Koç, Ç.K., Paar, C., Eds.; Springer: Berlin, Heidelberg, 1999; Volume 1717, pp. 292–302. ISBN 978-3-540-66646-2. [Google Scholar]
  25. Kabin, I.; Dyka, Z.; Kreiser, D.; Langendoerfer, P. Evaluation of Resistance of ECC Designs Protected by Different Randomization Countermeasures against Horizontal DPA Attacks. In Proceedings of the 2017 IEEE East-West Design Test Symposium (EWDTS), Novi Sad, Serbia, 29 September–2 October 2017; pp. 1–7. [Google Scholar]
  26. Kabin, I.; Dyka, Z.; Kreiser, D.; Langendoerfer, P. Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. In Information and Communications Security; Springer: Cham, Switzerland, 2017; pp. 225–235. [Google Scholar]
  27. Langer EMV-MFA-R 0.2-75, Near-Field Micro Probe 1 MHz up to 1 GHz. Available online: https://www.langer-emv.de/en/product/mfa-active-1mhz-up-to-6-ghz/32/mfa-r-0-2-75-near-field-micro-probe-1-mhz-up-to-1-ghz/854 (accessed on 31 January 2022).
  28. Kabin, I.; Dyka, Z.; Klann, D.; Aftowicz, M.; Langendoerfer, P. Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J. Electron. Test. 2021, 37, 289–303. [Google Scholar] [CrossRef]
  29. Dyka, Z.; Kabin, I.; Klann, D.; Langendoerfer, P. Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks. In Proceedings of the 2021 10th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 7–10 June 2021; pp. 1–6. [Google Scholar]
  30. Kabin, I.; Dyka, Z.; Klann, D.; Langendoerfer, P. Methods Increasing Inherent Resistance of ECC Designs against Horizontal Attacks. Integration 2020, 73, 50–67. [Google Scholar] [CrossRef]
  31. Kabin, I.; Dyka, Z.; Klann, D.; Langendoerfer, P. Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. In Proceedings of the 2019 14th International Conference on Design Technology of Integrated Systems In Nanoscale Era (DTIS), Mykonos, Greece, 16–18 April 2019; pp. 1–6. [Google Scholar]
Figure 1. Structure of our design.
Figure 1. Structure of our design.
Sensors 22 03083 g001
Figure 2. Processing sequence for a key bit in the main loop in our implementation for ECs over GF(2n), corresponding to Table 1.
Figure 2. Processing sequence for a key bit in the main loop in our implementation for ECs over GF(2n), corresponding to Table 1.
Sensors 22 03083 g002
Figure 3. Operation sequence for a point doubling or a point addition in our implementation for ECs over GF(p), corresponding to Table 2.
Figure 3. Operation sequence for a point doubling or a point addition in our implementation for ECs over GF(p), corresponding to Table 2.
Sensors 22 03083 g003
Figure 4. ECs B-233 (blue line) and B-283 (green line): a part of the simulated power traces of a kP execution corresponding to the processing of two key bits “01”.
Figure 4. ECs B-233 (blue line) and B-283 (green line): a part of the simulated power traces of a kP execution corresponding to the processing of two key bits “01”.
Sensors 22 03083 g004
Figure 5. ECs P-224 (black dotted line) and P-256 (yellow line): a part of the simulated power traces of a kP execution corresponding to the processing of two key bits “01”.
Figure 5. ECs P-224 (black dotted line) and P-256 (yellow line): a part of the simulated power traces of a kP execution corresponding to the processing of two key bits “01”.
Sensors 22 03083 g005
Figure 6. Attack results: (a) ECs B-233 (blue line) and B-283 (green line); (b) ECs P-224 (black dotted line) and P-256 (yellow line).
Figure 6. Attack results: (a) ECs B-233 (blue line) and B-283 (green line); (b) ECs P-224 (black dotted line) and P-256 (yellow line).
Sensors 22 03083 g006
Figure 7. Attack results analyzing kP traces of EC B-233: the red line corresponds to the design implementing the B-233 curve only; the blue line shows the resistance of our four-EC design described here, i.e., it corresponds to the blue line in Figure 6a.
Figure 7. Attack results analyzing kP traces of EC B-233: the red line corresponds to the design implementing the B-233 curve only; the blue line shows the resistance of our four-EC design described here, i.e., it corresponds to the blue line in Figure 6a.
Sensors 22 03083 g007
Figure 8. Arty Z7-20 development board (a), and the measurement location on its backside (b).
Figure 8. Arty Z7-20 development board (a), and the measurement location on its backside (b).
Sensors 22 03083 g008
Figure 9. Attack results for the EM traces measured on an FPGA: (a) ECs B-233 (blue line) and B-283 (green line); (b) ECs P-224 (black dotted line) and P-256 (orange line).
Figure 9. Attack results for the EM traces measured on an FPGA: (a) ECs B-233 (blue line) and B-283 (green line); (b) ECs P-224 (black dotted line) and P-256 (orange line).
Sensors 22 03083 g009
Figure 10. Visualization of the data from Table 5. Gray and orange bars correspond to the data obtained analyzing a kP trace for the ECs P-224 and P-256, respectively.
Figure 10. Visualization of the data from Table 5. Gray and orange bars correspond to the data obtained analyzing a kP trace for the ECs P-224 and P-256, respectively.
Sensors 22 03083 g010
Figure 11. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) for the P-224 elliptic curve: (a) shows the shapes of all atomic patterns with 4 regions (zoomed in on (be)) where the multiplier is not active; (b) shows the region that corresponds to clock cycles 11 to 14; (c) shows a part of the 24th clock cycle; (d) shows clock cycles 71 to 74 of the atomic pattern; (e) shows clock cycles 86 to 91 of the atomic pattern.
Figure 11. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) for the P-224 elliptic curve: (a) shows the shapes of all atomic patterns with 4 regions (zoomed in on (be)) where the multiplier is not active; (b) shows the region that corresponds to clock cycles 11 to 14; (c) shows a part of the 24th clock cycle; (d) shows clock cycles 71 to 74 of the atomic pattern; (e) shows clock cycles 86 to 91 of the atomic pattern.
Sensors 22 03083 g011
Figure 12. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) for the P-256 elliptic curve: (a) shows the shapes of all atomic patterns with 4 regions (zoomed in on (be)) where the multiplier is not active; (b) shows the region that corresponds to clock cycles 11 to 14; (c) shows a part of the 24th clock cycle; (d) shows clock cycles 71 to 74 of the atomic pattern; (e) shows clock cycles 86 to 91 of the atomic pattern.
Figure 12. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) for the P-256 elliptic curve: (a) shows the shapes of all atomic patterns with 4 regions (zoomed in on (be)) where the multiplier is not active; (b) shows the region that corresponds to clock cycles 11 to 14; (c) shows a part of the 24th clock cycle; (d) shows clock cycles 71 to 74 of the atomic pattern; (e) shows clock cycles 86 to 91 of the atomic pattern.
Sensors 22 03083 g012
Figure 13. Attack results for the kP traces of ECs P-224 (a) and P-256 (b). Violet and brown lines correspond to the design with dummy partial multiplications; black dotted and orange lines correspond to the original design and are given as a reference.
Figure 13. Attack results for the kP traces of ECs P-224 (a) and P-256 (b). Violet and brown lines correspond to the design with dummy partial multiplications; black dotted and orange lines correspond to the original design and are given as a reference.
Sensors 22 03083 g013
Figure 14. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) in clock cycle 13 for P-224 (a) and P-256 (b).
Figure 14. Shapes for the processing of EC point doublings (see green marked area) and EC point additions (see magenta marked area) in clock cycle 13 for P-224 (a) and P-256 (b).
Sensors 22 03083 g014
Table 1. Operation flow in the main loop iterations in our implementation for ECs over GF(2n).
Table 1. Operation flow in the main loop iterations in our implementation for ECs over GF(2n).
Operationki = 0ki = 1
M1Z2 ← X1∙Z2 (or X4 ← X2∙Z1)Z1 ← X1∙Z2 (or X4 ← X2∙Z1)
Sq1X3 ← Z12X3 ← Z22
Sq2a = Z14a = Z24
M2X1 ← X2∙Z1 (or Z2 ← X1∙Z2)X2 ←X2∙Z1 (or Z1 ← X1∙Z2)
Z1 ←aZ2 ←a
Sq3X2 ← X12X1 ← X22
M3X1 ← b∙Z1X2 ← b∙Z2
Add1a = Z2 + X1 (or a = X4 + Z2)a = Z1 + X2 (or a = X4 + Z1)
M4Z1← X1∙Z2 (or Z1 ← X4∙Z2)Z2 ← X2∙Z1 (or Z2 ← X4∙Z1)
Sq4Z2 ← a2Z1 ← a2
M5m = x∙Z2m = x∙Z1
Sq5, Add2X1 ← X22 + X1X2 ← X12 + X2
M6Z1 ← X3 ∙ X2Z2 ← X3 ∙ X1
Add3X2 ← m + Z1X1 ← m + Z2
Table 2. Operation flow for point doublings and point additions in our design for ECs over GF(p).
Table 2. Operation flow for point doublings and point additions in our design for ECs over GF(p).
Title 1Point Doubling: 2SPoint Addition: S + P
inputs:inputs:
S = (X1:X2:X3:Z1:Z2)S = (X1:X2:X3:Z1:Z2)
P = (X:Y:Zq)—input point
M1R0 ← X3 ∙ X3R1 ←X ∙ Z1
Add1R2 ← X2 + X2R2 ← X2 + X2
Add2R1 ← X1 − R0R1 ← R1 − X1
M2Z1 ← X2 ∙ R2R2 ← R1 ∙ R1
Add3X2 ← Z1 + Z1R0 ← R2 + R2
M3R3 ← R2 ∙ X3R3 ← X1 ∙ R2
M4R2 ←X2 ∙ X1R0 ←Y ∙ Z2
Add4X1 ← X1 + R0Z2 ←Z2 + R0
M5R0 ←R1 ∙ X1Z2 ←R1 ∙ R2
M6R1 ← Z1 ∙ X2R2 ← X3 ∙ R1
Add5X1 ← R0 + R0X1 ←R3 + R3
Add6R0 ← R0 + X1X1 ← Z2 + X1
M7X1 (R0)2Z1(X1)2
Add7X1 ← X1 − R2R0 ← R0 − X2
M8Z1 (R3)2R1(R0)2
Add8X1 ← X1 − R2X1 ←R1 − X1
Add9R2 ← R2 − X1R1 ←R3 − X1
M9Z2 ← Z1 ∙ R3R3 ← R1 ∙ R0
M10X2 ← R0 ∙ R2R0 ← X2 ∙ Z2
X3 ← R3X3 ← R2
Add10X2 ← X2 − R1X2 ←R3 − R0
output:output:
2S = (X1:X2:X3:Z1:Z2)S + P = (X1:X2:X3:Z1:Z2)
Table 3. Arty Z7-20 FPGA resources used by the whole design and the multiplier block.
Table 3. Arty Z7-20 FPGA resources used by the whole design and the multiplier block.
ResourceAvailableDesign UtilizationMultiplier Block Utilization
LUT53,20033,897 (63.72%)16,928 (31.82%)
FF106,40011,150 (10.48%)2445 (2.30%)
DSP22017 (7.73%)17 (7.73%)
Table 4. Results of the comparison to the mean attack applied to simulated and measured traces.
Table 4. Results of the comparison to the mean attack applied to simulated and measured traces.
Elliptic CurveNumber of Key Candidates Extracted with a Correctness δ
Simulated TracesMeasured Traces
80% ≤ δ < 90%δ > 90%80% ≤ δ < 90%δ > 90%
B-2332050
B-2833080
P-224661218
P-25687920
Table 5. Distribution of the “leaky” samples over the atomic pattern.
Table 5. Distribution of the “leaky” samples over the atomic pattern.
Clock Cycle1213247172737486878991
Number of samples with a high leakage
EC P-224-4705748-205-1317211-
EC P-2564503196587200299116243
Table 6. Arty Z7-20 FPGA resources used by the modified design and the multiplier block.
Table 6. Arty Z7-20 FPGA resources used by the modified design and the multiplier block.
ResourceAvailableDesign UtilizationMultiplier Block Utilization
LUT53,20034,336 (64.54%)17,387 (32.68%)
FF106,40011,149 (10.48%)2445 (2.30%)
DSP22017 (7.73%)17 (7.73%)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kabin, I.; Dyka, Z.; Langendoerfer, P. Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors 2022, 22, 3083. https://doi.org/10.3390/s22083083

AMA Style

Kabin I, Dyka Z, Langendoerfer P. Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors. 2022; 22(8):3083. https://doi.org/10.3390/s22083083

Chicago/Turabian Style

Kabin, Ievgen, Zoya Dyka, and Peter Langendoerfer. 2022. "Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks" Sensors 22, no. 8: 3083. https://doi.org/10.3390/s22083083

APA Style

Kabin, I., Dyka, Z., & Langendoerfer, P. (2022). Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors, 22(8), 3083. https://doi.org/10.3390/s22083083

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop