SCA-secure ECC in software - mission impossible?

IACR Cryptol. ePrint Arch.(2021)

引用 3|浏览3
暂无评分
摘要
This paper describes an ECC implementation computing the X25519 key-exchange protocol on the ARM-Cortex M4 microcontroller. This software comes with extensive mitigations against various side-channel and fault attacks and is, to our best knowledge, the first to claim affordable protection against multiple classes of attacks that are motivated by distinct real-world application scenarios. We also present results of a comprehensive side-channel evaluation. We distinguish between X25519 with ephemeral keys and X25519 with static keys and show that the overhead to protect the two is about 36% and 239% respectively. While this might seem to be a high price to pay for security, we also show that even our (most protected) static implementation is more efficient than widely-deployed ECC cryptographic libraries, which offer much less protections.
更多
查看译文
关键词
Elliptic Curve Cryptography,Side-Channel Analysis,Fault Injection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要