D 2023

SoK: SCA-secure ECC in software – mission impossible?

BATINA, Lejla; Lukasz Michal CHMIELEWSKI; Björn HAASE; Niels SAMWEL; Peter SCHWABE et al.

Základní údaje

Originální název

SoK: SCA-secure ECC in software – mission impossible?

Autoři

BATINA, Lejla; Lukasz Michal CHMIELEWSKI; Björn HAASE; Niels SAMWEL a Peter SCHWABE

Vydání

Germany, IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 1, od s. 557-589, 33 s. 2023

Nakladatel

Ruhr-University of Bochum

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Stát vydavatele

Německo

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Označené pro přenos do RIV

Ne

Organizace

Fakulta informatiky – Masarykova univerzita – Repozitář

ISSN

EID Scopus

Klíčová slova anglicky

Elliptic Curve Cryptography; Side-Channel Analysis; Fault Injection
Změněno: 16. 5. 2024 04:14, RNDr. Daniel Jakubík

Anotace

V originále

This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cortex-M4 microcontroller. For providing protections against various side-channel and fault attacks we first review known attacks and countermeasures, then we provide software implementations that come with extensive mitigations, and finally we present a preliminary side-channel evaluation. To our best knowledge, this is the first public software claiming affordable protection against multiple classes of attacks that are motivated by distinct real-world application scenarios. We distinguish between X25519 with ephemeral keys and X25519 with static keys and show that the overhead to our baseline unprotected implementation is about 37% and 243%, respectively. While this might seem to be a high price to pay for security, we also show that even our (most protected) static implementation is at least as efficient as widely-deployed ECC cryptographic libraries, which offer much less protection.

Přiložené soubory