Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC
Audrey Lucas, Arnaud Tisserand
2018
Abstract
Scalar multiplication is the main operation in elliptic curve cryptography. In embedded systems, it is vulnerable to both observation and perturbation attacks. Most of protections only target one of these two types of attacks. Unfortunately, many protections against one type of attack may reduce the protection against the other one. In this paper, we simultaneously deal with protections against both types of attacks. Two countermeasures are presented for scalar multiplication and implemented on a Cortex-M0 microcontroller. The first one protects finite field operations over point coordinates. The second one protects the scalar (or key) bits.
DownloadPaper Citation
in Harvard Style
Lucas A. and Tisserand A. (2018). Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 404-411. DOI: 10.5220/0006884604040411
in Bibtex Style
@conference{secrypt18,
author={Audrey Lucas and Arnaud Tisserand},
title={Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={404-411},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006884604040411},
isbn={978-989-758-319-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC
SN - 978-989-758-319-3
AU - Lucas A.
AU - Tisserand A.
PY - 2018
SP - 404
EP - 411
DO - 10.5220/0006884604040411