On the Implementation of Unified Arithmetic on Binary Huff Curves
Unified formula for computing elliptic curve point addition and doubling are considered to be resistant against simple power-analysis attack. A new elliptic curve formula known as unified binary Huff curve in this regard has appeared into the literature in 2011. This paper is devoted to analyzing the applicability of this elliptic curve in practice. Our paper has two contributions. We provide an efficient implementation of the unified Huff formula in projective coordinates on FPGA. Secondly, we point out its side-channel vulnerability and show the results of an actual attack. It is claimed that the formula is unified and there will be no power consumption difference when computing point addition and point doubling operations, observable with simple power analysis (SPA). In this paper, we contradict their claim showing actual SPA results on a FPGA platform and propose a modified arithmetic and its suitable implementation technique to overcome the vulnerability.
KeywordsElliptic curves Binary fields Side-channel FPGA Karatsuba multiplier Power analysis SPA
Unable to display preview. Download preview PDF.
- 5.Brier, É., Déchène, I., Joye, M.: Unified point addition formulæ for elliptic curve cryptosystems. In: Embedded Cryptographic Hardware: Methodologies and Architectures, pp. 247–256. Nova Science Publishers (2004)Google Scholar
- 6.Chatterjee, A., Sengupta, I.: FPGA implementation of Binary edwards curve using ternary representation. In: GLSVLSI 2011, pp. 73–78 (2011)Google Scholar
- 15.Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
- 19.Side-channel attack standard evaluation board, http://www.morita-tech.co.jp/SASEBO/en/board/sasebo-g.html