Power and Electromagnetic Analysis for Template AttacksReport as inadecuate

Power and Electromagnetic Analysis for Template Attacks - Download this document for free, or read online. Document in PDF available to download.

1 Télécom ParisTech 2 Digital Security Group Nijmegen ICIS - Institute for Computing and Information Sciences Nijmegen 3 THALES COMMUNICATIONS & SECURITY 4 Secure-IC S.A.S

Abstract : Elliptic curve cryptography ECC is prone to physical attacks exploring side-channel leakages from power consumption or electromagnetic emanations. When performing a side-channel evaluation of ECC implementations one can choose among different side-channels and analysis methods that sometimes implies more accurate results. Typically, electromagnetic analysis performs better when pattern matching algorithms are deployed, while power analysis is more precise with Hamming weight models. In this paper, we perform template attacks with power and electromagnetic side-channels, in order to compare the efficiency of those methods in real-world software implementations.More precisely, we perform Online Template Attack, an efficient attack technique applied to regular scalar multiplication algorithms. To retrieve the secret scalar during a scalar-multiplication with Online Template Attack, it is sufficient to acquire one trace per key bit. In order to compare power and electromagnetic analysis, we use the double-and-add-always algorithm on a twisted Edwards curve running on a smart card with an ATmega163 CPU.

Keywords : Elliptic Curve Cryptography Side-Channel Attacks Power Analysis Electromagnetic Analysis Template Attacks

Author: Margaux Dugardin - Louiza Papachristodoulou - Zakaria Najm - Lejla Batina - Jean-Christophe Courrège - Jean-Luc Danger - Sylvain

Source: https://hal.archives-ouvertes.fr/


Related documents