首页> 外文会议>International Symposium on Information Theory and its Applications >Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P
【24h】

Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P

机译:在ATmega328P上针对Curve25519使用4阶元素进行边信道攻击

获取原文

摘要

With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.
机译:关于设备之间(尤其是IoT设备)之间安全通信的问题,越来越多的应用程序需要信任的协议才能使用公钥密码术进行通信。如今,椭圆曲线密码学是一种非常安全,高效的公钥密码学方法。最近的安全曲线之一是Curve25519,它的故障之一是在Diffie-Hellman密钥交换期间对低阶元素的攻击。本文档演示了通过简单的功耗分析在嵌入式系统上使用4阶攻击的可能性,并指出了使用Curve255119作为加密方法的每种IoT,这是潜在的侧通道攻击目标。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号