All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

SoK: SCA-secure ECC in software – mission impossible?

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F23%3A00134761" target="_blank" >RIV/00216224:14330/23:00134761 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.46586/tches.v2023.i1.557-589" target="_blank" >http://dx.doi.org/10.46586/tches.v2023.i1.557-589</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.46586/tches.v2023.i1.557-589" target="_blank" >10.46586/tches.v2023.i1.557-589</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    SoK: SCA-secure ECC in software – mission impossible?

  • Original language description

    This paper describes an ECC implementation computing the X25519 keyexchange protocol on the Arm Cortex-M4 microcontroller. For providing protections against various side-channel and fault attacks we first review known attacks and countermeasures, then we provide software implementations that come with extensive mitigations, and finally we present a preliminary side-channel evaluation. To our best knowledge, this is the first public software claiming affordable protection against multiple classes of attacks that are motivated by distinct real-world application scenarios. We distinguish between X25519 with ephemeral keys and X25519 with static keys and show that the overhead to our baseline unprotected implementation is about 37% and 243%, respectively. While this might seem to be a high price to pay for security, we also show that even our (most protected) static implementation is at least as efficient as widely-deployed ECC cryptographic libraries, which offer much less protection.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 1

  • ISBN

  • ISSN

    2569-2925

  • e-ISSN

  • Number of pages

    33

  • Pages from-to

    557-589

  • Publisher name

    Ruhr-University of Bochum

  • Place of publication

    Germany

  • Event location

    Conference on Cryptographic Hardware and Embedde

  • Event date

    Jan 1, 2023

  • Type of event by nationality

    CST - Celostátní akce

  • UT code for WoS article