2017
DOI: 10.1007/978-3-319-69453-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Embedded ECC Implementations Through cmov Side Channels

Abstract: Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document. When citing, please reference the published version. Take down policy While the University of Birmingham exercises care and attention in making items available there are rare occasions when an item has been uploaded in error or has been deemed to be commercially or otherwise sensitive.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(48 citation statements)
references
References 51 publications
0
48
0
Order By: Relevance
“…We have not evaluated the implementation against higher order attacks, like cross-correlation [34] (Observe that the scalar splitting should mitigate the cross-correlation attack. ), horizontal cross-correlation [35], single trace template attacks [31] and horizontal cluster attacks [36]. We leave evaluating the implementation against these attacks as future work.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have not evaluated the implementation against higher order attacks, like cross-correlation [34] (Observe that the scalar splitting should mitigate the cross-correlation attack. ), horizontal cross-correlation [35], single trace template attacks [31] and horizontal cluster attacks [36]. We leave evaluating the implementation against these attacks as future work.…”
Section: Resultsmentioning
confidence: 99%
“…Based on the results presented above, we conclude that the implementation protected with coordinate randomization does not leak the intermediate point values during the scalar multiplication. However, the implementation seems to leak the key bit values; therefore, we suspect that the implementation might be susceptible to attacks similar to address-based DPA [30] or address-based template attacks [31].…”
Section: Implementation Protected With Coordinate Randomizationmentioning
confidence: 99%
“…One way to increase resilience against this class of attacks is by randomizing the full table before each point extraction using coordinate randomization, and minimizing the attack surface through some clever masking via a linear pass over the full table (this in order to thwart attacks targeting memory accesses [40]). However, other more sophisticated countermeasures might be required to protect against recent onetrace template attacks that inspect memory accesses [39]. We remark that some variants of these attacks are only adequately mitigated at lower abstraction levels, i.e., the underlying hardware architecture should be noisy enough such that these attacks become impractical.…”
Section: Protected Scalar Multiplicationmentioning
confidence: 99%
“…The problem lies on the fact that the power consumption of setting all bits in a register is perceptibly higher than that of keeping the register with all its bits equal to zero. An attacker can exploit that fact and discover the secret key through a power measurement of the algorithm execution . We are able to mitigate this vulnerability by using the instruction BLENDV, as shown in Listing 5.…”
Section: Power Side‐channel Vulnerabilitymentioning
confidence: 99%
“…An attacker can exploit that fact and discover the secret key through a power measurement of the algorithm execution. 30 We are able to mitigate this vulnerability by using the instruction BLENDV, as shown in Listing 5. This vulnerability used to occur not only in the word rotation but also in all conditional copies implemented in the original version.…”
Section: Power Side-channel Vulnerabilitymentioning
confidence: 99%