Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems

This paper describes a differential electromagnetic analysis attack performed on a hardware implementation of an elliptic curve cryptosystem. We describe the use of the distance of mean test. The number of measurements needed to get a clear idea of the right guess of the key-bit is taken as indication of the success of the attack. We can find the right key-bit by using only 2000 measurements. Also we give a electromagnetic model for the FPGA we use in our experiments. The amplitude, the direction and the position of the current on the FPGA's lines with respect to the position of the antenna have an influence on the measured electromagnetic radiation in the FPGA's surrounding area.

[1]  F. Lobkowicz,et al.  Physics for Scientists and Engineers, Vol. I , 1976 .

[2]  Joos Vandewalle,et al.  Hardware implementation of an elliptic curve processor over GF(p) , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.

[3]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[4]  Hervé Chabanne,et al.  Electromagnetic Side Channels of an FPGA Implementation of AES , 2004, IACR Cryptol. ePrint Arch..

[5]  Bart Preneel,et al.  Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier , 2008, Int. J. Embed. Syst..

[6]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[9]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[10]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[11]  Stefan Mangard Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs , 2003 .

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Bart Preneel,et al.  Power-Analysis Attacks on an FPGA - First Experimental Results , 2003, CHES.

[14]  Dakshi Agrawal,et al.  Multi-channel Attacks , 2003, CHES.

[15]  B. Preneel,et al.  Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".

[16]  Çetin Kaya Koç,et al.  Advances in side-channel cryptanalysis: microarchitectural attacks , 2007 .

[17]  J. R. Rao,et al.  The EM Side–Channel(s):Attacks and Assessment Methodologies , 2003 .

[18]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .