Skip to Main content Skip to Navigation
Conference papers

Template Attacks against ECC : practical implementation against Curve25519

Abstract : This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladder as a scalar multiplication method for calculating kP in constant time. In addition, our attack requires only one attack trace. This paper shows how the attack is performed on the mbedTLS Curve25519 function and why conventional coordinates randomization countermeasures do not prevent this type of attack. Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519.
Document type :
Conference papers
Complete list of metadata

https://hal-cea.archives-ouvertes.fr/cea-03157323
Contributor : Antoine Loiseau <>
Submitted on : Wednesday, March 3, 2021 - 9:49:54 AM
Last modification on : Thursday, March 4, 2021 - 3:15:00 AM

File

Template Attacks against ECC ...
Files produced by the author(s)

Identifiers

  • HAL Id : cea-03157323, version 1

Collections

Citation

Antoine Loiseau, Maxime Lecomte, Jacques Fournier. Template Attacks against ECC : practical implementation against Curve25519. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States. ⟨cea-03157323⟩

Share

Metrics

Record views

52

Files downloads

28