Close

Presentation

Inherent Vulnerability of Atomic Patterns due to Distinguishability of Field Multiplication and Squaring Operations
DescriptionThe most attacked operation in Elliptic Curve based cryptographic protocols is the Scalar Multiplication kP. As a defense against simple side-channel analysis (SCA), the atomicity principle and several atomic blocks were proposed. In this paper, we demonstrate that kP algorithms based on atomic patterns are vulnerable to SCA due to clear distinctions between field squaring and multiplication operations. The primary SCA leakage source is the handling of the second operand by the multiplier, creating a visible, one-clock-cycle long marker. We demonstrated this vulnerability experimenting with Longa's atomic patterns. This undermines the SCA resistance of many atomic patterns, enabling key extraction.