Search papers, labs, and topics across Lattice.
This paper analyzes the vulnerability of Elliptic Curve Cryptosystems (ECC) to simple Side-Channel Analysis (SCA) attacks targeting scalar multiplication. It highlights that variations in energy consumption during field multiplication, specifically when processing identical vs. distinct operands, can leak information. The authors implement and evaluate two mitigation strategies: data redirection and bus reloading, to prevent distinguishability between multiplication and squaring operations.
Your ECC implementation might be leaking secrets through power consumption differences between multiplication and squaring, regardless of your multiplication algorithm.
Scalar multiplication kP is a critical operation in Elliptic Curve Cryptosystems (ECC), often targeted by Side-Channel Analysis (SCA). Despite strategies based on atomic patterns to enhance security, the binary kP algorithms remain susceptible to simple SCA due to energy consumption variations in field multipliers during passing two different or two identical operands. This vulnerability arises independent of the multiplication method used. We implemented and analysed two mitigation techniques: one involving data redirection and another focusing on bus reloading.