Skip to Main content Skip to Navigation
Conference papers

Template Attacks against ECC : practical implementation against Curve25519

Abstract : This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladder as a scalar multiplication method for calculating kP in constant time. In addition, our attack requires only one attack trace. This paper shows how the attack is performed on the mbedTLS Curve25519 function and why conventional coordinates randomization countermeasures do not prevent this type of attack. Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519.
Document type :
Conference papers
Complete list of metadata
Contributor : Antoine Loiseau Connect in order to contact the contributor
Submitted on : Wednesday, March 3, 2021 - 9:49:54 AM
Last modification on : Sunday, June 26, 2022 - 12:31:40 AM


Template Attacks against ECC ...
Files produced by the author(s)


  • HAL Id : cea-03157323, version 1



Antoine Loiseau, Maxime Lecomte, Jacques J A Fournier. Template Attacks against ECC : practical implementation against Curve25519. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States. ⟨cea-03157323⟩



Record views


Files downloads