{"title":"Horizontal Address-Bit DEMA against ECDSA","authors":"I. Kabin, Z. Dyka, D. Kreiser, P. Langendörfer","doi":"10.1109/NTMS.2018.8328695","DOIUrl":null,"url":null,"abstract":"With the advent of the Internet of Things security features become more and more important. Especially data integrity and authentication of its origin are of utmost importance. Digital signatures are a well-known means to provide these features. In this paper we detail our horizontal DEMA attack against a hardware implementation of the Montgomery kP algorithm for the NIST elliptic curve B-233. We apply the attack successfully against the ECDSA algorithm. In the past vertical attacks exploiting the key dependable activity of the bus and addressing of registers have been published. In contrast to those attacks we performed a horizontal attack exploiting the same phenomena using a single trace of electromagnetic emanations.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2018.8328695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
With the advent of the Internet of Things security features become more and more important. Especially data integrity and authentication of its origin are of utmost importance. Digital signatures are a well-known means to provide these features. In this paper we detail our horizontal DEMA attack against a hardware implementation of the Montgomery kP algorithm for the NIST elliptic curve B-233. We apply the attack successfully against the ECDSA algorithm. In the past vertical attacks exploiting the key dependable activity of the bus and addressing of registers have been published. In contrast to those attacks we performed a horizontal attack exploiting the same phenomena using a single trace of electromagnetic emanations.