Summary

The 2018 International Symposium on Information Theory and Its Applications (ISITA2018)

2018

Session Number:We-PM-1-2

Session:

Number:We-PM-1-2.3

Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P

Yoshinori Uetake,  Akihiro Sanada,  Takuya Kusaka,  Yasuyuki Nogami,  Leo Weissbart,  Sylvain Duquesne,  

pp.650-654

Publication Date:2018/10/18

Online ISSN:2188-5079

DOI:10.34385/proc.55.We-PM-1-2.3

PDF download

PayPerView

Summary:
With the matter of secure communication between devices, and especially for IoT devices, more and more applications need trustful protocols to communicate using public key cryptography. Elliptic curve cryptography is nowadays a very secure and efficient public key cryptography method. One of the most recent and secure curve is Curve25519 and one of its failure is attack on low-order elements during a Diffie-Hellman key exchange. This document demonstrates that an attack using an order 4 point is possible on an embedded system with a simple power analysis, pointing out every IoT using Curve255119 as a cryptographic method, a potential target to side-channel attacks.