• DocumentCode
    237006
  • Title

    Hardware/software co-design flavors of elliptic curve scalar multiplication

  • Author

    Balasch, Josep ; Gierlichs, Benedikt ; Jaurvinen, Kimmo ; Verbauwhede, Ingrid

  • Author_Institution
    ESAT/COSIC & iMinds, KU Leuven, Leuven, Belgium
  • fYear
    2014
  • fDate
    4-8 Aug. 2014
  • Firstpage
    758
  • Lastpage
    763
  • Abstract
    Many electronic applications use cryptographic algorithms implemented in embedded devices to provide some form of security, e.g. smart cards (banking, SIM, access control), mobile phones, wifi routers, etc. The tight resource constraints of the devices, typically silicon area and power or energy, together with requirements from the application, typically latency or throughput, demand highly efficient implementations of the often computationally complex cryptographic algorithms. We provide a broad overview of the hardware/software co-design space for an essential component of many cryptographic protocols. Based on our experience from teaching a master level course about hardware/software co-design, we explore four typical implementation options and provide concrete implementation results. In addition to the aforementioned criteria, resistance against implementation attacks is vital for the security of embedded cryptographic devices. We analyze our four implementations with respect to a security issue that is due to their electromagnetic emanations, and highlight multiple vulnerabilities that can be exploited to break their security. Next, we investigate state-of-the-art implementation options that are supposed to resist these attacks. We detail their implementation cost and show that it is non-trivial to implement these options securely. Our main contribution is a comprehensive analysis of many implementation options with respect to implementation cost and attack resistance on a single common platform.
  • Keywords
    coprocessors; cryptographic protocols; hardware-software codesign; public key cryptography; attack resistance; cryptographic protocols; elliptic curve scalar multiplication; embedded cryptographic devices; hardware-software codesign; implementation cost; Clocks; Field programmable gate arrays; Hardware; Registers; Security; Software; Software algorithms;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electromagnetic Compatibility (EMC), 2014 IEEE International Symposium on
  • Conference_Location
    Raleigh, NC
  • Print_ISBN
    978-1-4799-5544-2
  • Type

    conf

  • DOI
    10.1109/ISEMC.2014.6899070
  • Filename
    6899070