SoK: SCA-secure ECC in software – mission impossible?
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F23%3A00134761" target="_blank" >RIV/00216224:14330/23:00134761 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.46586/tches.v2023.i1.557-589" target="_blank" >http://dx.doi.org/10.46586/tches.v2023.i1.557-589</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.46586/tches.v2023.i1.557-589" target="_blank" >10.46586/tches.v2023.i1.557-589</a>
Alternative languages
Result language
angličtina
Original language name
SoK: SCA-secure ECC in software – mission impossible?
Original language description
This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cortex-M4 microcontroller. For providing protections against various side-channel and fault attacks we first review known attacks and countermeasures, then we provide software implementations that come with extensive mitigations, and finally we present a preliminary side-channel evaluation. To our best knowledge, this is the first public software claiming affordable protection against multiple classes of attacks that are motivated by distinct real-world application scenarios. We distinguish between X25519 with ephemeral keys and X25519 with static keys and show that the overhead to our baseline unprotected implementation is about 37% and 243%, respectively. While this might seem to be a high price to pay for security, we also show that even our (most protected) static implementation is at least as efficient as widely-deployed ECC cryptographic libraries, which offer much less protection.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2023
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 1
ISBN
—
ISSN
2569-2925
e-ISSN
—
Number of pages
33
Pages from-to
557-589
Publisher name
Ruhr-University of Bochum
Place of publication
Germany
Event location
Conference on Cryptographic Hardware and Embedde
Event date
Jan 1, 2023
Type of event by nationality
CST - Celostátní akce
UT code for WoS article
—