A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards

被引:19
|
作者
Danger, Jean-Luc [1 ,2 ]
Guilley, Sylvain [1 ,2 ]
Hoogvorst, Philippe [1 ]
Murdica, Cedric [1 ,2 ]
Naccache, David [3 ]
机构
[1] TELECOM ParisTech, CNRS LTCI, Inst TELECOM, Dept COMELEC, Paris, France
[2] Secure IC SAS, F-35700 Rennes, France
[3] Ecole Normale Super, Dept Informat, F-75230 Paris 05, France
关键词
Elliptic curve cryptography; Side-channel attacks; Countermeasures;
D O I
10.1007/s13389-013-0062-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Elliptic curve cryptography in embedded systems is vulnerable to side-channel attacks. Those attacks exploit biases in various kinds of leakages, such as power consumption, electromagnetic emanation, execution time, ... The integration of countermeasures is required to thwart known attacks. No single countermeasure can cover the whole range of attacks; thus many of them shall be combined. However, as each of them has a non negligible cost, one cannot simply apply all of them. It is necessary to wisely select countermeasures, depending on the context and on the trade-off between security and performance. This paper summarizes the side-channel attacks and countermeasures on Elliptic Curve Cryptography. For each countermeasure, the cost in time and space is given. Some attacks are clarified such as the doubling attack; others are improved like the horizontal SVA, and new attacks are described like the horizontal attack against the unified formulae.
引用
收藏
页码:241 / 265
页数:25
相关论文
共 50 条
  • [1] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [2] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [3] Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography
    Leon Villegas, Felipe Ignacio
    Valencia Cordero, Claudio
    [J]. 2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 266 - 272
  • [4] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167
  • [5] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [6] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [7] Evolving Side-Channel Resistant Reconfigurable Hardware for Elliptic Curve Cryptography
    Poudel, Bikash
    Louis, Sushil J.
    Munir, Arslan
    [J]. 2017 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2017, : 2428 - 2436
  • [8] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    [J]. 2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +
  • [9] Elliptic curve cryptography on smart cards without coprocessors
    Woodbury, AD
    Bailey, DV
    Paar, C
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 2000, 52 : 71 - 92
  • [10] Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks
    Yoon, JC
    Jung, SW
    Lee, S
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 139 - 151