2017
DOI: 10.1007/978-3-319-54669-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations

Abstract: Abstract. Single-trace side-channel attacks are a serious threat to elliptic curve cryptography in practice because they can break also cryptosystems where scalars are nonces (e.g., ECDSA). Previously it was believed that single-trace attacks can be avoided by using scalar multiplication algorithms with regular patterns of operations but recently we have learned that they can be broken with correlation tests to decide whether different operations share common operands. In this work, we extend these attacks to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 54 publications
0
9
0
Order By: Relevance
“…In the more general unsupervised setting (see e.g. [8][9][10][11][12]17]), the access to a training device is not possible. The attacker acquires as many traces as possible and induces a maximal value for b that can be handled through the attack.…”
Section: Overall Attack Processmentioning
confidence: 99%
“…In the more general unsupervised setting (see e.g. [8][9][10][11][12]17]), the access to a training device is not possible. The attacker acquires as many traces as possible and induces a maximal value for b that can be handled through the attack.…”
Section: Overall Attack Processmentioning
confidence: 99%
“…The scalar multiplication algorithm is based on the curve arithmetic of the Ed25519 implementation presented in [24], which is available online at http://cryptojedi.org/crypto/# avrnacl. The elliptic curve used in Ed25519 is the twisted Edwards curve E : −x 2 + y 2 = 1 + dx 2 For more details on Ed25519 and this specific curve, see [6,7].…”
Section: Target Implementation and Experimental Setupmentioning
confidence: 99%
“…The whole underlying field and curve arithmetic is the same as in [24]. This means in particular that points are internally represented in extended coordinates as proposed in [22].…”
Section: Target Implementation and Experimental Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is worth noting that [HMHW09] and [UW14] mount correlation power analysis on multi-precision integer multiplication using the product scanning method in ECDSA and optimal-Ate pairings, respectively. Also, [JB16] launches (repeated) single-trace correlation/clustering attacks against the operand-scanning field multiplications in elliptic curve scalar multiplication with precomputations, and claims its applicability to the product scanning method. Streamlined NTRU Prime has positive integer parameters p, q, and w: p and q are primes; 2p ≥ 3w; q ≥ 16w + 1; x p − x − 1 is irreducible in (Z/qZ) [x].…”
Section: Introductionmentioning
confidence: 99%