Skip to main content

2020 | OriginalPaper | Buchkapitel

Side-Channel Attacks on Blinded Scalar Multiplications Revisited

verfasst von : Thomas Roche, Laurent Imbert, Victor Lomné

Erschienen in: Smart Card Research and Advanced Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a series of recent articles (from 2011 to 2017), Schindler et al. show that exponent/scalar blinding is not as effective a countermeasure as expected against side-channel attacks targeting RSA modular exponentiation and ECC scalar multiplication. Precisely, these works demonstrate that if an attacker is able to retrieve many randomizations of the same secret, this secret can be fully recovered even when a significative proportion of the blinded secret bits are erroneous. With a focus on ECC, this paper improves the best results of Schindler et al. in the specific case of structured-order elliptic curves. Our results show that larger blinding material and higher error rates can be successfully handled by an attacker in practice. This study also opens new directions in this line of work by the proposal of a three-steps attack process that isolates the attack critical path (in terms of complexity and success rate) and hence eases the development of future solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A more formal notation would be \(\{T_{\ell }\}_{\ell \in \mathbb {Z}; 0 \leqslant \ell < N}\).
 
2
A learning phase is conducted prior to the attack on a similar device where scalar multiplication inputs and randoms can be chosen, e.g. a template building or a deep-learning training phase.
 
3
Without the empirical improvements discussed in Sect. 2.3.
 
4
The array Lr must be initialized to an integer array of dimension \(N\times L\) with all cells initialized to \(-1\) but the first column (Lr[i][0] for all \(i<N\)) which must be initialized to 0.
 
5
For \(t=R\), at iteration i, all bits of \({\bar{r}_\ell }\) and \({\bar{d}_\ell }\) are considered for probability estimation, this version is labeled “Full”.
 
Literatur
6.
Zurück zum Zitat FIPS PUB 186–3: Digital Signature Standard. National Institute of Standards and Technology, March 2006. Draft FIPS PUB 186–3: Digital Signature Standard. National Institute of Standards and Technology, March 2006. Draft
14.
Zurück zum Zitat Schindler, W., Wiemers, A.: Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure. In: NIST Workshop on ECC Standards (2015) Schindler, W., Wiemers, A.: Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure. In: NIST Workshop on ECC Standards (2015)
16.
Zurück zum Zitat Specht, R., Heyszl, J., Kleinsteuber, M., Sigl, G.: Improving Non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 3–19. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21476-4_1CrossRef Specht, R., Heyszl, J., Kleinsteuber, M., Sigl, G.: Improving Non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements. In: Mangard, S., Poschmann, A.Y. (eds.) COSADE 2014. LNCS, vol. 9064, pp. 3–19. Springer, Cham (2015). https://​doi.​org/​10.​1007/​978-3-319-21476-4_​1CrossRef
Metadaten
Titel
Side-Channel Attacks on Blinded Scalar Multiplications Revisited
verfasst von
Thomas Roche
Laurent Imbert
Victor Lomné
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42068-0_6