Template Attacks against ECC : practical implementation against Curve25519 - CEA - Commissariat à l’énergie atomique et aux énergies alternatives Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

Template Attacks against ECC : practical implementation against Curve25519

Résumé

This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladder as a scalar multiplication method for calculating kP in constant time. In addition, our attack requires only one attack trace. This paper shows how the attack is performed on the mbedTLS Curve25519 function and why conventional coordinates randomization countermeasures do not prevent this type of attack. Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519.
Fichier principal
Vignette du fichier
Template Attacks against ECC practical.pdf (737.29 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

cea-03157323 , version 1 (03-03-2021)

Identifiants

  • HAL Id : cea-03157323 , version 1

Citer

Antoine Loiseau, Maxime Lecomte, Jacques J A Fournier. Template Attacks against ECC : practical implementation against Curve25519. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States. ⟨cea-03157323⟩
106 Consultations
685 Téléchargements

Partager

Gmail Facebook X LinkedIn More