Template Attacks against ECC : practical implementation against Curve25519 - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Access content directly
Conference Papers Year :

Template Attacks against ECC : practical implementation against Curve25519

Abstract

This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladder as a scalar multiplication method for calculating kP in constant time. In addition, our attack requires only one attack trace. This paper shows how the attack is performed on the mbedTLS Curve25519 function and why conventional coordinates randomization countermeasures do not prevent this type of attack. Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519.
Fichier principal
Vignette du fichier
Template Attacks against ECC practical.pdf (737.29 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

cea-03157323 , version 1 (03-03-2021)

Identifiers

  • HAL Id : cea-03157323 , version 1

Cite

Antoine Loiseau, Maxime Lecomte, Jacques J A Fournier. Template Attacks against ECC : practical implementation against Curve25519. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States. ⟨cea-03157323⟩
91 View
459 Download

Share

Gmail Facebook Twitter LinkedIn More