TIMING AND SIMPLE POWER ANALYSIS ATTACK ON A FPGA IMPLEMENTATION OF AN ELLIPTIC CURVE CRYPTOSYSTEM

This report explain elliptic curve cryptography (ECC) processor with 158 bits private key, to process Q = k*P. And also explain timing and simple power analysis attacks (SPA) on a FPGA implementation of an elliptic curve processor. Elliptic Curve Cryptography is a complex, efficient and fast cryp...

Full description

Saved in:
Bibliographic Details
Main Author: ZULKIFLI, MUCHAMMAD
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/12408
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:This report explain elliptic curve cryptography (ECC) processor with 158 bits private key, to process Q = k*P. And also explain timing and simple power analysis attacks (SPA) on a FPGA implementation of an elliptic curve processor. Elliptic Curve Cryptography is a complex, efficient and fast cryptography for hardware implementation. Elliptic curve cryptography has been implemented in embedded and mobile applications. In this research elliptic curve processor is implemented using DE1 board Altera Cyclone® II tipe EP2C20F484C7. For hardware implementation, Elliptic curve cryptography radiate some new information (side effect, such as timing, power consumption, and electromagnetic radiation) that can be detected using side channel attack, attacking method from hardware. Side channel attack can be observed from timing and power consumption that is needed for cryptography process. This analysis process is important for access vulnerable information from unprotected processor. Process timing attack can predict the possibility of private key contained in the given ECC processor architecture. SPA attack on an unprotected implementation can find the private key with simple measurement and observation. Side-channel attack speed up the process of finding private key of the elliptic curve cryptography. The results of research, used a private key (158 bits) with a 76 bit value 1. The process of brute-force without the side-channel attack requires 2157 process. By timing attack requires 9.95E+45 process (reduced until 5.44% of the total process without timing attack). With simple power analysis had 100% to get the key value.