Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P

Yoshinori Uetake, Akihiro Sanada, Takuya Kusaka, Yasuyuki Nogami, Leo Weissbart, Sylvain Duquesne

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.

Original languageEnglish
Title of host publicationProceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages618-622
Number of pages5
ISBN (Electronic)9784885523182
DOIs
Publication statusPublished - Mar 8 2019
Event15th International Symposium on Information Theory and Its Applications, ISITA 2018 - Singapore, Singapore
Duration: Oct 28 2018Oct 31 2018

Publication series

NameProceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018

Conference

Conference15th International Symposium on Information Theory and Its Applications, ISITA 2018
CountrySingapore
CitySingapore
Period10/28/1810/31/18

Fingerprint

Public key cryptography
Embedded systems
Cryptography
Network protocols
Internet of things
Side channel attack
Secure communication

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Cite this

Uetake, Y., Sanada, A., Kusaka, T., Nogami, Y., Weissbart, L., & Duquesne, S. (2019). Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. In Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018 (pp. 618-622). [8664293] (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ISITA.2018.8664293

Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. / Uetake, Yoshinori; Sanada, Akihiro; Kusaka, Takuya; Nogami, Yasuyuki; Weissbart, Leo; Duquesne, Sylvain.

Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., 2019. p. 618-622 8664293 (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Uetake, Y, Sanada, A, Kusaka, T, Nogami, Y, Weissbart, L & Duquesne, S 2019, Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. in Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018., 8664293, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, Institute of Electrical and Electronics Engineers Inc., pp. 618-622, 15th International Symposium on Information Theory and Its Applications, ISITA 2018, Singapore, Singapore, 10/28/18. https://doi.org/10.23919/ISITA.2018.8664293
Uetake Y, Sanada A, Kusaka T, Nogami Y, Weissbart L, Duquesne S. Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. In Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc. 2019. p. 618-622. 8664293. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018). https://doi.org/10.23919/ISITA.2018.8664293
Uetake, Yoshinori ; Sanada, Akihiro ; Kusaka, Takuya ; Nogami, Yasuyuki ; Weissbart, Leo ; Duquesne, Sylvain. / Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 618-622 (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).
@inproceedings{25815e75265f4e619b3dcb710fac10c3,
title = "Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P",
abstract = "With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.",
author = "Yoshinori Uetake and Akihiro Sanada and Takuya Kusaka and Yasuyuki Nogami and Leo Weissbart and Sylvain Duquesne",
year = "2019",
month = "3",
day = "8",
doi = "10.23919/ISITA.2018.8664293",
language = "English",
series = "Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "618--622",
booktitle = "Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018",

}

TY - GEN

T1 - Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P

AU - Uetake, Yoshinori

AU - Sanada, Akihiro

AU - Kusaka, Takuya

AU - Nogami, Yasuyuki

AU - Weissbart, Leo

AU - Duquesne, Sylvain

PY - 2019/3/8

Y1 - 2019/3/8

N2 - With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.

AB - With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.

UR - http://www.scopus.com/inward/record.url?scp=85063871375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85063871375&partnerID=8YFLogxK

U2 - 10.23919/ISITA.2018.8664293

DO - 10.23919/ISITA.2018.8664293

M3 - Conference contribution

T3 - Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018

SP - 618

EP - 622

BT - Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -