Evolving Side-Channel Resistant Reconfigurable Hardware for Elliptic Curve Cryptography

被引:0
|
作者
Poudel, Bikash [1 ]
Louis, Sushil J. [1 ]
Munir, Arslan [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
美国国家科学基金会;
关键词
Elliptic curve cryptography; genetic algorithms; reconfigurable hardware design; side-channel attacks;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We propose to use a genetic algorithm to evolve novel reconfigurable hardware to implement elliptic curve cryptographic combinational logic circuits. Elliptic curve cryptography offers high security-level with a short key length making it one of the most popular public-key cryptosystems. Furthermore, there are no known sub-exponential algorithms for solving the elliptic curve discrete logarithm problem. These advantages render elliptic curve cryptography attractive for incorporating in many future cryptographic applications and protocols. However, elliptic curve cryptography has proven to be vulnerable to non-invasive side-channel analysis attacks such as timing, power, visible light, electromagnetic, and acoustic analysis attacks. In this paper, we use a genetic algorithm to address this vulnerability by evolving combinational logic circuits that correctly implement elliptic curve cryptographic hardware that is also resistant to simple timing and power analysis attacks. Using a fitness function composed of multiple objectives-maximizing correctness, minimizing propagation delays and minimizing circuit size, we can generate correct combinational logic circuits resistant to noninvasive, side channel attacks. To the best of our knowledge, this is the first work to evolve a cryptography circuit using a genetic algorithm. We implement evolved circuits in hardware on a Xilinx Kintex-7 FPGA. Results reveal that the evolutionary algorithm can successfully generate correct, and side-channel resistant combinational circuits with negligible propagation delay.
引用
收藏
页码:2428 / 2436
页数:9
相关论文
共 50 条
  • [21] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    [J]. COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283
  • [22] Versatile Hardware Framework for Elliptic Curve Cryptography
    Masek, Vit
    Novotny, Martin
    [J]. 2022 25TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS (DDECS), 2022, : 80 - 83
  • [23] Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve
    Olson, LD
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 220 - 229
  • [24] Power aware reconfigurable multiprocessor for elliptic curve cryptography
    Purnaprajna, Madhura
    Puttmann, Christoph
    Porrmarm, Mario
    [J]. 2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 1266 - 1271
  • [25] Reconfigurable Architecture for Elliptic Curve Cryptography Using FPGA
    Rahuman, A. Kaleel
    Athisha, G.
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [26] Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling
    Park, Dongjun
    Choi, Minsig
    Kim, Gyusang
    Bae, Daehyeon
    Kim, Heeseok
    Hong, Seokhie
    [J]. IEEE ACCESS, 2023, 11 : 44578 - 44589
  • [27] Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
    Möller, B
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 402 - 413
  • [28] Generic Side-Channel Countermeasures for Reconfigurable Devices
    Gueneysu, Tim
    Moradi, Amir
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 33 - 48
  • [29] Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
    Bozzio, Mathieu
    Cavailles, Adrien
    Diamanti, Eleni
    Kent, Adrian
    Pitalua-Garcia, Damian
    [J]. PRX QUANTUM, 2021, 2 (03):
  • [30] Multi-class SVMs Analysis of Side-Channel Information of Elliptic Curve Cryptosystem
    Saeedi, Ehsan
    Hossain, Md. Selim
    Kong, Yinan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2015,