Résumé :
|
"Curves and Keys Power analysis can recover cryptographic keys from implemented algorithms. In this article, Colin works through such an attack on an ECC hardware implementation, showing how you can identify leakage of key material that makes an attack possible. Topics Discussed How power analysis can recover cryptographic keys from implemented algorithms.How attestation worksHow to understand the point multiply operation in ECCWhat are the steps in power analysis?How to plot the actual resultsHow to understand the hidden number problem (HNP) Tech Used NewAE Technology CW305 target boardECDSA (elliptic curve digital signature algorithm)Power analysis This month I’m going to take you through a side channel attack on a hardware elliptic curve cryptography (ECC) implementation. This might be new to you, as I’ve found that ECC isn’t as well-known or used as AES (advanced encryption standard). I’ve covered attacks on AES in many previous issues—including fault attacks, and power analysis on software and hardware implementations of AES. I won’t cover a full introduction to ECC, because it turns out that even attacking it doesn’t require you to know all the details. But, if you’re looking for a friendly introduction, my favorite reference is the book “Serious Cryptography” by Jean-Philippe Aumasson. The important difference compared to algorithms such as AES is that ECC is an asymmetric algorithm. With asymmetric cryptography we have a public and private key pair." (Extrait de Circuit Cellar n°372)
|