A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller

Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

Among the increasing evolution of IoT devices, practical applications need reliable secure protocols to communicate with each other. A major issue for modern cryptosystems is an implementation of secure and trustworthy mechanisms to rely on. A side-channel attack against these cryptosystems may overturn the guarantee of security against conventional cyber-attacks. Elliptic curve cryptography is public-key cryptography based on elliptic curves, and one of the well-known curves is Curve25519 which is used for TLS protocols as a recommended curve. This curve is mainly implemented on limited resource devices such as microcontrollers. However, this curve poses a weakness for low-order points during a Diffie-Hellman key exchange is employed. This research demonstrates possible exploitation of a threat of order 8 rational points of Curve25519 and shows results of the side-channel attacks using order 8 rational points on an embedded system. The results indicate the order 8 rational points might be applied to key extraction as attacker sides.

Original languageEnglish
Title of host publicationProceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages225-231
Number of pages7
ISBN (Electronic)9781728147253
DOIs
Publication statusPublished - 2019
Event7th International Symposium on Computing and Networking, CANDAR 2019 - Nagasaki, Japan
Duration: 26 Nov 201929 Nov 2019

Conference

Conference7th International Symposium on Computing and Networking, CANDAR 2019
Country/TerritoryJapan
CityNagasaki
Period26/11/1929/11/19

Keywords

  • Curve25519
  • microcontroller
  • order 8 rational point
  • side-channel attack

Fingerprint

Dive into the research topics of 'A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller'. Together they form a unique fingerprint.

Cite this