2018年
Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P.
Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
- ,
- ,
- ,
- ,
- ,
- 開始ページ
- 618
- 終了ページ
- 622
- 記述言語
- 英語
- 掲載種別
- 研究論文(国際会議プロシーディングス)
- DOI
- 10.23919/ISITA.2018.8664293
- 出版者・発行元
- IEEE
With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.
- リンク情報
-
- DOI
- https://doi.org/10.23919/ISITA.2018.8664293
- DBLP
- https://dblp.uni-trier.de/rec/conf/isita/UetakeSKNWD18
- Web of Science
- https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=JSTA_CEL&SrcApp=J_Gate_JST&DestLinkType=FullRecord&KeyUT=WOS:000468678100127&DestApp=WOS_CPL
- URL
- https://dblp.uni-trier.de/conf/isita/2018
- URL
- https://dblp.uni-trier.de/db/conf/isita/isita2018.html#UetakeSKNWD18
- Scopus
- https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85063871375&origin=inward
- Scopus Citedby
- https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85063871375&origin=inward
- ID情報
-
- DOI : 10.23919/ISITA.2018.8664293
- DBLP ID : conf/isita/UetakeSKNWD18
- SCOPUS ID : 85063871375
- Web of Science ID : WOS:000468678100127