Dismantling Real-World ECC with Horizontal and Vertical Template Attacks

نویسندگان

  • Margaux Dugardin
  • Louiza Papachristodoulou
  • Zakaria Najm
  • Lejla Batina
  • Jean-Luc Danger
  • Sylvain Guilley
چکیده

Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attacks makes it feasible to extract a 256-bit secret key with only 257 traces. This paper enhances the applicability of this attack by exploiting both the horizontal leakage of the carry propagation during the nite eld multiplication, and the vertical leakage of the input data. As a further contribution, our method provides detection and auto-correction of possible errors that may occur during the key recovery. These enhancements come at the cost of extra traces, while still providing a practical attack. Finally, we show that the elliptic curve technology developed in PolarSSL running on a ARM STM32F4 platform is completely vulnerable, when used without any modi cations or countermeasures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)

Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because their private keys are usually long-term. Well known countermeasures like regularity, projective coordinates and scalar randomization, among others, are used to harden implementations against common ...

متن کامل

A resolution comparison of horizontal and vertical magnetic transfer functions

The main goal of the present study is to identify characteristics of the inter-station horizontal magnetic responses and the vertical magnetic data, as two types of magnetotelluric transfer functions, in the modeling procedure. Through consideration of model responses and two-dimensional inversion of synthetic data, sensitivity of the data components in detecting different geophysical structure...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Evaluation of Seismic Performance of Combined Horizontal and Vertical Hexagrid Structural System for High-rise Buildings

Summary In this study, the seismic performance of hexagrid structures which are composed of horizontal and vertical hexagrid by using a transitional story, has been investigated. To this end, 10 models of 50-story hexagrid structures were designed. 9 models with horizontal hexagrid cells which transited to vertical cells using a transitional story, and a model of completely horizontal hexagrid ...

متن کامل

Experimental Study on Hydraulic Parameters of Vertical Drops Equipped to Horizontal Screen with Different Relative Distances

The present study aimed to investigate and compare the laboratory results of energy dissipation and length of vertical Drops equipped with horizontal Screens with the results of standard stilling basins of type one, two, three and four simple vertical Drops. For this purpose, 64 different experiments were performed on vertical Drops equipped with a horizontal Screen at relative distances of 0, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015