![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Template Power Analysis Against ECC Software Implementations
Template Power Analysis Against ECC Software ImplementationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Gurchetan Grewal. Side-channel attacks are a real threat against ECC software implementations on microcontrollers. The X25519 Diffie-Hellman Key Exchange protocol on Curve25519 allows for efficient and simple constant time implementations, making it suitable for application on constrained environments, such as microcontrollers. Protection against power analysis requires specific countermeasures, which may be costly in performance but still not effective against template attacks. I’ll show that the power consumption leakage of a single instruction can reveal bits of the private key by means of a template SPA attack on a X25519 implementation for an 8-bit AVR microcontroller. Also, I’ll show that Flash memory addresses leak through power, which could be used to recover the secret-dependent indexes in lookups of tables of precomputed points, typically applied in optimized signature generation implementations. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsAnalysis Reading Seminar 2019/2020 Particle Physics Seminars ddddOther talksCounting cycles in planar graphs Control variates for computing transport coefficients TBC Horizontal Mean Curvature Flow and stochastic optimal controls Quantum Sensing in Space Hunt for an Earth-twin |