Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor
- This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Document Type: | Conference Object |
---|---|
Language: | English |
Author: | Jacek Samotyja, Kerstin Lemke-Rust |
Parent Title (English): | Bilgin, Nikova et al. (Eds.): Proceedings of the 2016 ACM Workshop on Theory of Implementation Security (TIS'16). Vienna, Austria, October 24-28, 2016 |
First Page: | 27 |
Last Page: | 35 |
ISBN: | 978-1-4503-4575-0 |
DOI: | https://doi.org/10.1145/2996366.2996371 |
Publisher: | ACM Press |
Date of first publication: | 2016/10/24 |
Copyright: | © 2016 Copyright held by the owner/author(s). Publication rights licensed to ACM. Abstracting with credit is permitted. |
Keyword: | ARM Cortex M3 Processor; Elliptic Curve Cryptography; ScalarMultiplication; Side Channel Countermeasures |
Departments, institutes and facilities: | Fachbereich Informatik |
Institut für Cyber Security & Privacy (ICSP) | |
Dewey Decimal Classification (DDC): | 0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik |
Entry in this database: | 2016/10/31 |