Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin
{"title":"关于龙格原子模式可区分性的实际调查","authors":"Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin","doi":"arxiv-2409.11868","DOIUrl":null,"url":null,"abstract":"This paper investigates the distinguishability of the atomic patterns for\nelliptic curve point doubling and addition operations proposed by Longa. We\nimplemented a binary elliptic curve scalar multiplication kP algorithm with\nLonga's atomic patterns for the NIST elliptic curve P-256 using the open-source\ncryptographic library FLECC in C. We measured and analysed an electromagnetic\ntrace of a single kP execution on a microcontroller (TI Launchpad F28379\nboard). Due to various technical limitations, significant differences in the\nexecution time and the shapes of the atomic blocks could not be determined.\nFurther investigations of the side channel analysis-resistance can be performed\nbased on this work. Last but not least, we examined and corrected Longa's\natomic patterns corresponding to formulae proposed by Longa.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Practical Investigation on the Distinguishability of Longa's Atomic Patterns\",\"authors\":\"Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin\",\"doi\":\"arxiv-2409.11868\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates the distinguishability of the atomic patterns for\\nelliptic curve point doubling and addition operations proposed by Longa. We\\nimplemented a binary elliptic curve scalar multiplication kP algorithm with\\nLonga's atomic patterns for the NIST elliptic curve P-256 using the open-source\\ncryptographic library FLECC in C. We measured and analysed an electromagnetic\\ntrace of a single kP execution on a microcontroller (TI Launchpad F28379\\nboard). Due to various technical limitations, significant differences in the\\nexecution time and the shapes of the atomic blocks could not be determined.\\nFurther investigations of the side channel analysis-resistance can be performed\\nbased on this work. Last but not least, we examined and corrected Longa's\\natomic patterns corresponding to formulae proposed by Longa.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"50 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.11868\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.11868","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
本文研究了 Longa 提出的椭圆曲线点倍增和加法运算原子模式的可区分性。我们使用 C 语言的开源加密库 FLECC,针对 NIST 椭圆曲线 P-256 使用 Longa 的原子模式实现了二进制椭圆曲线标量乘法 kP 算法。我们测量并分析了单个 kP 在微控制器(TI Launchpad F28379 板)上执行的电磁跟踪。由于各种技术限制,无法确定执行时间和原子块形状的显著差异。最后但并非最不重要的一点是,我们根据 Longa 提出的公式检验并修正了 Longa 的原子模式。
Practical Investigation on the Distinguishability of Longa's Atomic Patterns
This paper investigates the distinguishability of the atomic patterns for
elliptic curve point doubling and addition operations proposed by Longa. We
implemented a binary elliptic curve scalar multiplication kP algorithm with
Longa's atomic patterns for the NIST elliptic curve P-256 using the open-source
cryptographic library FLECC in C. We measured and analysed an electromagnetic
trace of a single kP execution on a microcontroller (TI Launchpad F28379
board). Due to various technical limitations, significant differences in the
execution time and the shapes of the atomic blocks could not be determined.
Further investigations of the side channel analysis-resistance can be performed
based on this work. Last but not least, we examined and corrected Longa's
atomic patterns corresponding to formulae proposed by Longa.