Filters








382 Hits in 7.2 sec

Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures

Tianhong Xu, Gongye Cheng, Yunsi Fei
2022 Proceedings of the Great Lakes Symposium on VLSI 2022  
We propose an unsupervised differentialbit horizontal clustering attack and implement it against an ECDH FPGA implementation.  ...  Over the past decade, a few side-channel attacks (SCAs) and countermeasures against implementations of Elliptic-Curve Cryptography (ECC), commonly used in embedded systems and Internet-of-Things (IoT)  ...  Horizontal Clustering Attack Framework Recent years have seen unsupervised clustering techniques being applied to side-channel power analysis [4, 16, 17] .  ... 
doi:10.1145/3526241.3530342 fatcat:wbjmcjxhjvbtzn5qnvtjjdihli

Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version) [article]

Erick Nascimento, Lukasz Chmielewski
2017 IACR Cryptology ePrint Archive  
In practice horizontal attacks have been applied to overcome protected ECC implementations on FPGAs.  ...  Side-channel attacks are a threat to cryptographic algorithms running on embedded devices.  ...  Running on embedded systems, they are a common target of side-channel attacks.  ... 
dblp:journals/iacr/NascimentoC17 fatcat:3x3mjse46vcbfgplz5tpdnilka

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

Guilherme Perin, Łukasz Chmielewski, Lejla Batina, Stjepan Picek
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Nevertheless, horizontal attacks based on a single trace still pose serious threats to protected ECC or RSA implementations.  ...  To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys.  ...  We thank anonymous reviewers and the shepherd for the suggestions on how to improve the paper.  ... 
doi:10.46586/tches.v2021.i1.343-372 fatcat:dvaxbi67ener7doaop53ixkgle

Attacking Embedded ECC Implementations Through cmov Side Channels [chapter]

Erick Nascimento, Łukasz Chmielewski, David Oswald, Peter Schwabe
2017 Lecture Notes in Computer Science  
Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different attacks  ...  However, this attack is applied to an implementation that is not protected with either,  ...  Horizontal attacks on RSA [57, 18, 17, 8, 6, 30, 55, 15, 9, 54] and ECC [7, 28] are emerging forms of side-channel attacks on exponentiation-based or scalar-multiplication-based algorithms.  ... 
doi:10.1007/978-3-319-69453-5_6 fatcat:mmyz3ye4a5bhpklp2cda2a6c24

Completing the Complete ECC Formulae with Countermeasures

Łukasz Chmielewski, Pedro Massolino, Jo Vliegen, Lejla Batina, Nele Mentens
2017 Journal of Low Power Electronics and Applications  
The results show that applying an increasing level of countermeasures leads to an increasing resistance against side-channel attacks.  ...  This is the first work looking into side-channel security issues of hardware implementations of the complete formulae.  ...  ECC arithmetic on the FPGA, while the authors of Riscure and Radboud mainly worked on the high-level architecture (including countermeasures) and the side-channel evaluation.  ... 
doi:10.3390/jlpea7010003 fatcat:gujyt7mbsvdcnoqd4qfctnbfd4

SCA-secure ECC in software - mission impossible? [article]

Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021 IACR Cryptology ePrint Archive  
This paper describes an ECC implementation computing the X25519 key-exchange protocol on the ARM-Cortex M4 microcontroller.  ...  This software comes with extensive mitigations against various side-channel and fault attacks and is, to our best knowledge, the first to claim affordable protection against multiple classes of attacks  ...  A class of single-trace attacks is often called horizontal attacks. These attacks trace back to [107] , and was applied against ECC in [12, 28, 50] .  ... 
dblp:journals/iacr/BatinaCHSS21 fatcat:cjgvyu4mjjegflz32afpgykwfm

A Study on the SCA Trends for Application to IoT Devices

Bo-Yeon Sim, Dong-Guk Han
2020 Journal of Internet Services and Information Security  
Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place.  ...  In particular, single-trace attacks that only use side-channel information are actively studied; it eliminates the need for information about the input and output values of cryptographic algorithms.  ...  Side-Channel Analysis In 1996, Kocher was first presented SCA which uses physical information that occurs when cryptographic algorithms are running on embedded systems [29] .  ... 
doi:10.22667/jisis.2020.02.29.002 dblp:journals/jisis/SimH20 fatcat:4sjvs66efzfctfw3v5emu7yezi

Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware [chapter]

Erich Wenger, Thomas Korak, Mario Kirschbaum
2013 Lecture Notes in Computer Science  
In this paper, we investigate a practical attack scenario on a randomized ECC hardware implementation suitable for RFID tags.  ...  ., Elliptic Curve Cryptography (ECC). It is specially important to consider that RFID tags are easily accessible to perform practical side-channel attacks due to their fields of applications.  ...  However, since they applied a CPA attack using 1,000 traces, their attack cannot be applied on ECC implementations that use random scalars.  ... 
doi:10.1007/978-3-642-41332-2_9 fatcat:5cixu7xikjcvxf4nz6jhlr2gse

Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC [article]

Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López
2019 IACR Cryptology ePrint Archive  
However, ECC also has security issues, such as Side-Channel Attacks (SCA), which are a growing threat in the implementation of cryptographic devices.  ...  for the future implementation of security mechanisms suitable for embedded devices applied to Internet of Things.  ...  Combined Attack, Passive and Active Attack (PACA) Amiel et al. in [5] presents a combined attack on a resistant implementation to side channel of RSA. This attack is easily applied to ECC.  ... 
dblp:journals/iacr/AbarzuaCL19 fatcat:7g66bmaxhbg7jhzx2fotyboi6m

Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations [chapter]

Kimmo Järvinen, Josep Balasch
2017 Lecture Notes in Computer Science  
Single-trace side-channel attacks are a serious threat to elliptic curve cryptography in practice because they can break also cryptosystems where scalars are nonces (e.g., ECDSA).  ...  We also show that successful attacks are possible even without knowledge of precomputed values by using clustering instead of correlations.  ...  Clustering has been previously used in side-channel attacks on ECC by Heyszl et al. in [31] .  ... 
doi:10.1007/978-3-319-54669-8_9 fatcat:utkdt6q6rjfmtp43h7xrjrr264

Template Attacks against ECC: practical implementation against Curve25519

Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier
2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
In addition, our attack requires only one attack trace.  ...  Then, a new countermeasure that is efficient against the presented attack will be proposed and tested. This work was carried out on the implementation of mbedTLS from Curve25519.  ...  Among physical attacks, we can discern side-channel attacks (SCA).  ... 
doi:10.1109/host45689.2020.9300261 fatcat:2xw2oq2xsvgunb6x4h7uycoabe

Practical Evaluation of Protected Residue Number System Scalar Multiplication

Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
2018 Transactions on Cryptographic Hardware and Embedded Systems  
In this paper, we propose a generic, thorough and analytic evaluation approach for protected scalar multiplication implementations with RNS and traditional Side Channel Attack (SCA) countermeasures in  ...  On the security of RNS, our data and location dependent template attacks show that even protected implementations are vulnerable to these attacks.  ...  Introduction The security of embedded devices, even devices with dedicated cryptographic processors, is dependent on resilience against side-channel attacks (SCA).  ... 
doi:10.13154/tches.v2019.i1.259-282 dblp:journals/tches/Papachristodoulou19 fatcat:xvwboicvlbbhlpyk7nfmzjwida

Spread Spectrum Video Data Hiding, Interleaving and Synchronization [chapter]

Yun Q. Shi, Jiwu Huang, Heung-Kyu Lee
2004 Intelligent Watermarking Techniques  
One is to correct both random and bursts of errors using 3-D interleaving together with random error correction codes. Another is frame synchronization in hidden data detection.  ...  Real-time Implementation Real-time watermark embedding has been implemented on TriMedia processor board and FPGA-based board.  ...  Therefore embedding some side-information is a way to achieve synchronization.  ... 
doi:10.1142/9789812562524_0018 fatcat:rv766byvmfeergdoyeswwxsjwi

Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks

Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Deep Learning based Side-Channel Attacks (DL-SCA) are considered as fundamental threats against secure cryptographic implementations.  ...  We also study how an attack's accuracy gain translates to a drastic reduction of the remaining time complexity of a side-channel attacks through multiple scenarios on public-key implementations.  ...  It has been developed by CryptoExperts (https://www.cryptoexperts.com/) who deliberately did not include countermeasures against horizontal and address-bit attacks.  ... 
doi:10.46586/tches.v2021.i3.60-96 fatcat:gvoqvy2a6fh43hixm3hscfeb2a

Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms - [article]

Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021 IACR Cryptology ePrint Archive  
Deep Learning based Side-Channel Attacks (DL-SCA) are considered as fundamental threats against secure cryptographic implementations.  ...  We also study how an attack's accuracy gain translates to a drastic reduction of the remaining time complexity of a side-channel attacks through multiple scenarios on public-key implementations.  ...  It has been developed by CryptoExperts (https://www.cryptoexperts.com/) who deliberately did not include countermeasures against horizontal and address-bit attacks.  ... 
dblp:journals/iacr/ZaidBHV21 fatcat:3l73mbjz5revna6sbe6qd7rzou
« Previous Showing results 1 — 15 out of 382 results