Evolving Side-Channel Resistant Reconfigurable Hardware for Elliptic Curve Cryptography

被引:0
|
作者
Poudel, Bikash [1 ]
Louis, Sushil J. [1 ]
Munir, Arslan [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
美国国家科学基金会;
关键词
Elliptic curve cryptography; genetic algorithms; reconfigurable hardware design; side-channel attacks;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We propose to use a genetic algorithm to evolve novel reconfigurable hardware to implement elliptic curve cryptographic combinational logic circuits. Elliptic curve cryptography offers high security-level with a short key length making it one of the most popular public-key cryptosystems. Furthermore, there are no known sub-exponential algorithms for solving the elliptic curve discrete logarithm problem. These advantages render elliptic curve cryptography attractive for incorporating in many future cryptographic applications and protocols. However, elliptic curve cryptography has proven to be vulnerable to non-invasive side-channel analysis attacks such as timing, power, visible light, electromagnetic, and acoustic analysis attacks. In this paper, we use a genetic algorithm to address this vulnerability by evolving combinational logic circuits that correctly implement elliptic curve cryptographic hardware that is also resistant to simple timing and power analysis attacks. Using a fitness function composed of multiple objectives-maximizing correctness, minimizing propagation delays and minimizing circuit size, we can generate correct combinational logic circuits resistant to noninvasive, side channel attacks. To the best of our knowledge, this is the first work to evolve a cryptography circuit using a genetic algorithm. We implement evolved circuits in hardware on a Xilinx Kintex-7 FPGA. Results reveal that the evolutionary algorithm can successfully generate correct, and side-channel resistant combinational circuits with negligible propagation delay.
引用
收藏
页码:2428 / 2436
页数:9
相关论文
共 50 条
  • [1] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [2] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [3] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [4] Side Channel Attack Resistant Architecture for Elliptic Curve Cryptography
    Zode, Pravin
    Deshmukh, Raghavendra B.
    [J]. 2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [5] Faster Side-Channel Resistant Elliptic Curve Scalar Multiplication
    Venelli, Alexandre
    Dassance, Francois
    [J]. ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY 2009, 2010, 521 : 29 - +
  • [6] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [7] A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    Murdica, Cedric
    Naccache, David
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (04) : 241 - 265
  • [8] Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography
    Leon Villegas, Felipe Ignacio
    Valencia Cordero, Claudio
    [J]. 2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 266 - 272
  • [9] Performance analysis of elliptic curve cryptography on reconfigurable hardware
    Vig, Renu
    Tandon, Ravi
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 261 - +
  • [10] On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
    Jedlicka, Petr
    Malina, Lukas
    Socha, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    Hajny, Jan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,