DocumentCode :
237006
Title :
Hardware/software co-design flavors of elliptic curve scalar multiplication
Author :
Balasch, Josep ; Gierlichs, Benedikt ; Jaurvinen, Kimmo ; Verbauwhede, Ingrid
Author_Institution :
ESAT/COSIC & iMinds, KU Leuven, Leuven, Belgium
fYear :
2014
fDate :
4-8 Aug. 2014
Firstpage :
758
Lastpage :
763
Abstract :
Many electronic applications use cryptographic algorithms implemented in embedded devices to provide some form of security, e.g. smart cards (banking, SIM, access control), mobile phones, wifi routers, etc. The tight resource constraints of the devices, typically silicon area and power or energy, together with requirements from the application, typically latency or throughput, demand highly efficient implementations of the often computationally complex cryptographic algorithms. We provide a broad overview of the hardware/software co-design space for an essential component of many cryptographic protocols. Based on our experience from teaching a master level course about hardware/software co-design, we explore four typical implementation options and provide concrete implementation results. In addition to the aforementioned criteria, resistance against implementation attacks is vital for the security of embedded cryptographic devices. We analyze our four implementations with respect to a security issue that is due to their electromagnetic emanations, and highlight multiple vulnerabilities that can be exploited to break their security. Next, we investigate state-of-the-art implementation options that are supposed to resist these attacks. We detail their implementation cost and show that it is non-trivial to implement these options securely. Our main contribution is a comprehensive analysis of many implementation options with respect to implementation cost and attack resistance on a single common platform.
Keywords :
coprocessors; cryptographic protocols; hardware-software codesign; public key cryptography; attack resistance; cryptographic protocols; elliptic curve scalar multiplication; embedded cryptographic devices; hardware-software codesign; implementation cost; Clocks; Field programmable gate arrays; Hardware; Registers; Security; Software; Software algorithms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electromagnetic Compatibility (EMC), 2014 IEEE International Symposium on
Conference_Location :
Raleigh, NC
Print_ISBN :
978-1-4799-5544-2
Type :
conf
DOI :
10.1109/ISEMC.2014.6899070
Filename :
6899070
Link To Document :
بازگشت