International Workshop on Constructive Side-Channel Analysis and Secure Design

COSADE 2016: Constructive Side-Channel Analysis and Secure Design pp 88-108

Dismantling Real-World ECC with Horizontal and Vertical Template Attacks

  • Margaux Dugardin
  • Louiza Papachristodoulou
  • Zakaria Najm
  • Lejla Batina
  • Jean-Luc Danger
  • Sylvain Guilley
Conference paper

DOI: 10.1007/978-3-319-43283-0_6

Volume 9689 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Dugardin M., Papachristodoulou L., Najm Z., Batina L., Danger JL., Guilley S. (2016) Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. In: Standaert FX., Oswald E. (eds) Constructive Side-Channel Analysis and Secure Design. COSADE 2016. Lecture Notes in Computer Science, vol 9689. Springer, Cham

Abstract

Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attacks makes it feasible to extract a 256-bit secret key with only 257 traces. This paper enhances the applicability of this attack by exploiting both the horizontal leakage of the carry propagation during the finite field multiplication, and the vertical leakage of the input data. As a further contribution, our method provides detection and auto-correction of possible errors that may occur during the key recovery. These enhancements come at the cost of extra traces, while still providing a practical attack. Finally, we show that the elliptic curve algorithms developed for PolarSSL, and consequently mbedTLS, running on an ARM STM32F4 platform is completely vulnerable, when used without any modifications or countermeasures.

Keywords

Side-channel analysis Horizontal leakage Vertical leakage Scalar multiplication Brainpool curves NIST curves mbedTLS 

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Margaux Dugardin
    • 1
    • 2
  • Louiza Papachristodoulou
    • 3
  • Zakaria Najm
    • 1
  • Lejla Batina
    • 3
  • Jean-Luc Danger
    • 1
  • Sylvain Guilley
    • 1
  1. 1.COMELECTELECOM ParisTechParisFrance
  2. 2.Thales Communications & Security, CESTIToulouseFrance
  3. 3.Digital Security GroupRadboud University NijmegenNijmegenThe Netherlands