Abstract

Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported in the literature. Since such attacks are based on detecting collisions of data dependent leakage caused by underlying long integer multiplications, so-called global shuffling countermeasure which breaks such collision correlation by independently randomizing the execution order of unit operations such as single precision multiplication and carry propagation, is considered as promising countermeasure if theoretical randomness of shuffling order is guaranteed. In this paper, we firstly analyze the practical security of the global shuffling long integer multiplications by exhibiting a combined single trace attack on software implementations on an ARM Cortex-M4 microcontroller. Our combined attack consists of a simple power analysis for revealing random permutation vectors which enables later collision-based single trace attack. First we demonstrate how to reveal random permutation vectors for carry propagation process of whole global shuffling long integer multiplications within a single power trace by simple power analysis accompanied with straightforward substitution of power consumption samples. Then we perform collision-based single trace attacks after rearranging the order of subtraces for unit carry propagations based on revealed permutation vectors. Since the vulnerability to simple power analysis is originated from the if-statement for selection of proper entries of the permutation vectors, we propose a novel countermeasure which eliminates such selection with simple addition and modulus operation and also demonstrate practical result achieving regularity in power trace patterns.

Highlights

  • Elliptic curve cryptosystems (ECC) [1], [2] are widely used until recently because of their advantages providing equivalent security with shorter key length compared with other public key cryptosystems (PKC) such as RSA, DSA, and, DH

  • We present the first practical results of a combined single trace attack, which is a combination of a simple power analysis for revealing permutation vectors and collision-based single trace attack with rearranging subtraces, on software implementations of global shuffling long integer multiplication (LIM), which is known to be secure against advanced collision-based single trace attacks, operated on an ARM Cortex-M4 based STM32F405 microcontroller [20] targeting 128, 192, and 256-bit ECC primitives

  • The vulnerability of global shuffling LIM is caused by the if-statement for selection of proper entries from the permutation vector

Read more

Summary

INTRODUCTION

Elliptic curve cryptosystems (ECC) [1], [2] are widely used until recently because of their advantages providing equivalent security with shorter key length compared with other public key cryptosystems (PKC) such as RSA, DSA, and, DH. We present the first practical results of a combined single trace attack, which is a combination of a simple power analysis for revealing permutation vectors and collision-based single trace attack with rearranging subtraces, on software implementations of global shuffling LIM, which is known to be secure against advanced collision-based single trace attacks, operated on an ARM Cortex-M4 based STM32F405 microcontroller [20] targeting 128, 192, and 256-bit ECC primitives. We introduce global shuffling LIM proposed in [12] which is known to defeat advanced collision-based single trace attacks when the algorithm is deployed by the latter scalar multiplications. We analyze the vulnerability of the global shuffling LIM and present attack scenarios for three elliptic curve cases on which recovery of the secret scalar is possible when unified point additions in projective coordinates are deployed.

PRELIMINARIES
9: Return CI
COUNTERMEASURE
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call