論文

2018年

Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P.

Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
  • Yoshinori Uetake
  • ,
  • Akihiro Sanada
  • ,
  • Takuya Kusaka
  • ,
  • Yasuyuki Nogami
  • ,
  • Leo Weissbart
  • ,
  • Sylvain Duquesne

開始ページ
618
終了ページ
622
記述言語
英語
掲載種別
研究論文(国際会議プロシーディングス)
DOI
10.23919/ISITA.2018.8664293
出版者・発行元
IEEE

With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.

リンク情報
DOI
https://doi.org/10.23919/ISITA.2018.8664293
DBLP
https://dblp.uni-trier.de/rec/conf/isita/UetakeSKNWD18
Web of Science
https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=JSTA_CEL&SrcApp=J_Gate_JST&DestLinkType=FullRecord&KeyUT=WOS:000468678100127&DestApp=WOS_CPL
URL
https://dblp.uni-trier.de/conf/isita/2018
URL
https://dblp.uni-trier.de/db/conf/isita/isita2018.html#UetakeSKNWD18
Scopus
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85063871375&origin=inward
Scopus Citedby
https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85063871375&origin=inward
ID情報
  • DOI : 10.23919/ISITA.2018.8664293
  • DBLP ID : conf/isita/UetakeSKNWD18
  • SCOPUS ID : 85063871375
  • Web of Science ID : WOS:000468678100127

エクスポート
BibTeX RIS