A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller

Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Among the increasing evolution of IoT devices, practical applications need reliable secure protocols to communicate with each other. A major issue for modern cryptosystems is an implementation of secure and trustworthy mechanisms to rely on. A side-channel attack against these cryptosystems may overturn the guarantee of security against conventional cyber-attacks. Elliptic curve cryptography is public-key cryptography based on elliptic curves, and one of the well-known curves is Curve25519 which is used for TLS protocols as a recommended curve. This curve is mainly implemented on limited resource devices such as microcontrollers. However, this curve poses a weakness for low-order points during a Diffie-Hellman key exchange is employed. This research demonstrates possible exploitation of a threat of order 8 rational points of Curve25519 and shows results of the side-channel attacks using order 8 rational points on an embedded system. The results indicate the order 8 rational points might be applied to key extraction as attacker sides.

Original languageEnglish
Title of host publicationProceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages225-231
Number of pages7
ISBN (Electronic)9781728147253
DOIs
Publication statusPublished - Nov 2019
Event7th International Symposium on Computing and Networking, CANDAR 2019 - Nagasaki, Japan
Duration: Nov 26 2019Nov 29 2019

Publication series

NameProceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019

Conference

Conference7th International Symposium on Computing and Networking, CANDAR 2019
CountryJapan
CityNagasaki
Period11/26/1911/29/19

    Fingerprint

Keywords

  • Curve25519
  • microcontroller
  • order 8 rational point
  • side-channel attack

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing

Cite this

Uetake, Y., Yoshimoto, K., Kodera, Y., Weissbart, L., Kusaka, T., & Nogami, Y. (2019). A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller. In Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019 (pp. 225-231). [8958444] (Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CANDAR.2019.00037