Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems
read more
Citations
Volatile FPGA design security { a survey
Security for volatile FPGAs
Charge-sharing symmetric adiabatic logic in countermeasure against power analysis attacks at cell level
Physical Side-Channel Attacks and Covert Communication on FPGAs: A Survey
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
References
A method for obtaining digital signatures and public-key cryptosystems
Antenna Theory: Analysis and Design
Differential Power Analysis
Elliptic curve cryptosystems
Use of Elliptic Curves in Cryptography
Related Papers (5)
Frequently Asked Questions (10)
Q2. What have the authors stated for future works in "Differential electromagnetic attack on an fpga implementation of elliptic curve cryptosystems" ?
In the future this model should be refined and checked with real measurements.
Q3. What were the first metrics used to decide for the correct hypothesis?
With the start of differential power analysis in [10], followed by the differential electromagnetic analysis [8, 17], several metrics were used to decide for the correct hypothesis.
Q4. What is the EC point multiplication algorithm?
The authors use the prediction matrices M3 (for kl−2 = 0 guess) and M4 (for kl−2 = 1 guess) in order to split the measurements in M2 into sets.
Q5. What is the main operation of the elliptic curve?
2.1 Elliptic curves over GF (p)An elliptic curve E is expressed in terms of the Weierstrass equation: y2 = x3 + ax + b , where a, b ∈ GF (p) with 4a3 + 27b2 6= 0 (mod p).
Q6. What is the setup of the FPGA?
The measurement setup consists of the FPGA board with a Xilinx Virtex 800 FPGA presented in [16], an Tektronix TDS714L oscilloscope, a handmade loop antenna, a function generator and a power supply.
Q7. How many times does the field in an FPGA measure?
In air this equals 120π and kg the wavenumber, A is the surface of the loop, The authoris the current through the loop and r is the distance from the center of the loop untill the point where the field is calculated.
Q8. What is the theoretical background of elliptic curves?
In Section 2 the theoretical background of elliptic curves, the electromagnetic radiation attacks and the distance of mean test are discussed.
Q9. What is the purpose of an FPGA antenna?
They are more used to receive than to transmit, especially when the efficiency of the antenna is not more important than the signal-tonoise-ratio [4]
Q10. What is the first step of the DEMA attack?
These temporary points and the output point Q are updated in the following order: Q = P , Q1 = 2P , Q2 = 3P ,Q = {2P ifkl−2 = 0 3P ifkl−2 = 1, Q1 = {4P ifkl−2 = 0 6P ifkl−2 = 1 .The first step of the DEMA attack is to find the point to measure.