A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications
[article]
2019
arXiv
pre-print
We systematize software side-channel attacks with a focus on vulnerabilities and countermeasures in the cryptographic implementations. ...
Based on these characterizations and evaluations, we offer some insights for side-channel researchers, cryptographic software developers and users. ...
., modular multiplication). Plaintext/ciphertext blinding can only defeat chosen-input side-channel attacks, while key blinding does not have this limitation. ...
arXiv:1911.09312v2
fatcat:o4am4aurlfajjkj7nuz3kbso6y
Online Template Attacks: Revisited
2021
Transactions on Cryptographic Hardware and Embedded Systems
An online template attack (OTA) is a powerful technique previously used to attack elliptic curve scalar multiplication algorithms. ...
side channels. ...
This leads to new application scenarios regardless of the exploited side channel. Section 2 presents background on elliptic curve scalar multiplication algorithms and microarchitecture side channels. ...
doi:10.46586/tches.v2021.i3.28-59
fatcat:p3v3uan37beprersu6oyuvggpi
Microarchitecture Online Template Attacks
[article]
2020
arXiv
pre-print
Online template attack (OTA) is a powerful technique previously used to attack elliptic curve scalar multiplication algorithms. ...
In this paper we start filling this gap by revisiting the original OTA description, proposing a generic framework and evaluation metrics for any side-channel signal. ...
Section 2 presents background on elliptic curve scalar multiplication algorithms and microarchitecture side-channels. ...
arXiv:2007.05337v1
fatcat:lry2o74mtbgpboescpa44zbncy
There's Something about m-ary
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we study the fixed-point scalar multiplication operation on elliptic curves in the context of embedded devices prone to physical attacks. ...
In particular, we study their security towards side-channel and fault analysis and propose a set of low-cost yet efficient countermeasures against these attacks. ...
Side-Channel Analysis and Countermeasures Countering SSCA on scalar multiplication can be achieved using regular implementations [25] . ...
doi:10.1007/978-3-319-03515-4_13
fatcat:6hgfdrwlpjfr3icxe63a2gjqza
May the Fourth Be With You
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17
with better countermeasures against side channel attacks. ...
We find that the resulting interactions of the point at infinity, order-2, and order-4 elements in the Montgomery ladder scalar-by-point multiplication routine create side channel leakage that allows us ...
Physical Side Channel Attacks on ECC Running on Complex Devices. ...
doi:10.1145/3133956.3134029
dblp:conf/ccs/GenkinVY17
fatcat:vdu6zzc3ubhqbdpxu3s4siga74
Using templates to distinguish multiplications from squaring operations
2011
International Journal of Information Security
In this paper we present practical results of an attack on RSA signature generation, protected in this manner, based on the expected difference in Hamming weight between the result of a multiplication ...
Moreover, an attacker does not need to know the plaintexts being operated on and, therefore, blinding and padding countermeasures applied to the plaintext do not hinder the attack in any way. ...
, in conjunction with side channel atomicity, to prevent an attacker being able to derive information on cryptographic keys. ...
doi:10.1007/s10207-011-0135-4
fatcat:uyx7shqlvnbupcq547djfb4pgu
CopyCat: Controlled Instruction-Level Attacks on Enclaves
[article]
2020
arXiv
pre-print
One particularly powerful class of controlled-channel attacks abuses page-table modifications to reliably track enclave memory accesses at a page-level granularity. ...
We propose an innovative controlled-channel attack, named CopyCat, that deterministically counts the number of instructions executed within a single enclave code page. ...
The libraries we examined implemented numerous mitigations against side-channel attacks, including always-add-and-double for elliptic curve scalar multiplication and RSA exponent masking, but these protections ...
arXiv:2002.08437v3
fatcat:5epnn447mjfq3hk6mqk35hlewm
Simple Power Analysis on Exponentiation Revisited
[chapter]
2010
Lecture Notes in Computer Science
In this paper we revisit Simple Power Analysis which is at the heart of side channel techniques. We aim at showing its true efficiency when studied rigorously. ...
We detail the different ways to achieve this and then show that some blinded exponentiations can still be threatened by Simple Power Analysis depending on the implementation. ...
Thanks also to Sean Commercial and Vincent Verneuil for their valuable comments and advice on this manuscript. ...
doi:10.1007/978-3-642-12510-2_6
fatcat:4bysihssnjfg7cguwuqprthozm
Chosen Base-Point Side-Channel Attack on Montgomery Ladder with x-only coordinate: with Application to secp256k1
2020
IET Information Security
This study revisits the side-channel security of the elliptic curve cryptography (ECC) scalar multiplication implemented with Montgomery ladder. ...
efficiency of the scalar recovery attack. ...
As a consequence, a number of publications focus on the side-channel security of the scalar multiplication when the scalar is the secret value; one can refer to [3] for a survey. ...
doi:10.1049/iet-ifs.2018.5228
fatcat:4opjklptgjhh5nugdr6fedvz64
Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
We manage to compute one step of the Montgomery Ladder in 4 multiplications and 4 squares. ...
On top of the performance benefits, cryptography over such curves have some intrinsic security properties against physical attacks. ...
Table 2 summarizes the theoretical advantages of the BEC model with respect to Side Channel Attacks (SCA) and Fault Attacks (FA). ...
doi:10.5220/0006831506250631
dblp:conf/icete/LoiseauF18
fatcat:5f7a45glwzblfkdazctqstefj4
SoK: Lessons Learned from SSL/TLS Attacks
[chapter]
2014
Lecture Notes in Computer Science
Protocols, on the PKI infrastructure and various other attacks. ...
This paper presents an overview on theoretical and practical attacks of the last 17 years, in chronological order and four categories: Attacks on the Handshake protocol, on the Record and Application Data ...
ECDSA signatures are generated in TLS/SSL when ECDHE ECDSA ciphersuites are used and rely on scalar multiplications. ...
doi:10.1007/978-3-319-05149-9_12
fatcat:u2hn3qqjzzbobmsm4h3tiibdl4
Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks
2015
2015 International Conference on Embedded Software (EMSOFT)
Our proposed techniques also exhibit better resistance against fault attacks and combined fault and side-channel attacks, compared to previous SPA-resistant techniques. ...
Side-channel analysis, including simple power analysis (SPA), is a class of powerful non-intrusive attacks that are suitable for adversaries with physical access to the device. ...
The technique also introduces a vulnerability to fault attacks; more specifically, to a combined fault and side-channel attack, as shown by Amiel et al. [2] . ...
doi:10.1109/emsoft.2015.7318271
dblp:conf/emsoft/MorenoHF15
fatcat:infjn6rcvvh2dmidzrc5tqhmha
Data-Hiding Codes
2005
Proceedings of the IEEE
Our focus is on the mathematical models, fundamental principles, and code design techniques that are applicable to data hiding. ...
Some of these applications imply the presence of an adversary attempting to disrupt the transmission of information to the receiver; other applications involve a noisy, generally unknown, communication channel ...
A typical scenario is one where a key-dependent block code is used, but the same key is used over multiple blocks, or over multiple images, etc. ...
doi:10.1109/jproc.2005.859599
fatcat:fshag72wujgntaoom7pd65uf24
An overview of scalar quantization based data hiding methods
2006
Signal Processing
We analyze quantization based embedding/detection techniques in terms of the proposed framework based on three key aspects. ...
The difference between the two frameworks is in how channel dependent nature is reflected in optimal encoding and decoding operations. ...
Costa showed that for an additive white Gaussian noise (AWGN) channel with Gaussian input and side information, the channel capacity does not depend on the side information. ...
doi:10.1016/j.sigpro.2005.07.018
fatcat:idc43dbnhbfypipahyc2krlzx4
Fast Constant-Time Modular Inversion over Resistant to Simple Power Analysis Attacks for IoT Applications
2022
Sensors
A modified BEE algorithm (MBEEA) resistant to simple power analysis attacks (SPA) is presented, and the design performance area-delay over is explored. ...
Our implementation over (length of p = 256 bits) with 2035 slices achieved one modular inversion in only 1.12 μs on Virtex-7. ...
[16] published a review on passive attacks on ECC scalar multiplication algorithms in 2016, including leakage sources and frequent errors exploited to attack the ECDSA system. ...
doi:10.3390/s22072535
pmid:35408148
pmcid:PMC9002486
fatcat:bsiuwvt6jvfnrmkdrjvwcmhfhe
« Previous
Showing results 1 — 15 out of 479 results