Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC

Audrey Lucas, Arnaud Tisserand

2018

Abstract

Scalar multiplication is the main operation in elliptic curve cryptography. In embedded systems, it is vulnerable to both observation and perturbation attacks. Most of protections only target one of these two types of attacks. Unfortunately, many protections against one type of attack may reduce the protection against the other one. In this paper, we simultaneously deal with protections against both types of attacks. Two countermeasures are presented for scalar multiplication and implemented on a Cortex-M0 microcontroller. The first one protects finite field operations over point coordinates. The second one protects the scalar (or key) bits.

Download


Paper Citation


in Harvard Style

Lucas A. and Tisserand A. (2018). Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 404-411. DOI: 10.5220/0006884604040411


in Bibtex Style

@conference{secrypt18,
author={Audrey Lucas and Arnaud Tisserand},
title={Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={404-411},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006884604040411},
isbn={978-989-758-319-3},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC
SN - 978-989-758-319-3
AU - Lucas A.
AU - Tisserand A.
PY - 2018
SP - 404
EP - 411
DO - 10.5220/0006884604040411