Abstract
Among the increasing evolution of IoT devices, practical applications need reliable secure protocols to communicate with each other. A major issue for modern cryptosystems is an implementation of secure and trustworthy mechanisms to rely on. A side-channel attack against these cryptosystems may overturn the guarantee of security against conventional cyber-attacks. Elliptic curve cryptography is public-key cryptography based on elliptic curves, and one of the well-known curves is Curve25519 which is used for TLS protocols as a recommended curve. This curve is mainly implemented on limited resource devices such as microcontrollers. However, this curve poses a weakness for low-order points during a Diffie-Hellman key exchange is employed. This research demonstrates possible exploitation of a threat of order 8 rational points of Curve25519 and shows results of the side-channel attacks using order 8 rational points on an embedded system. The results indicate the order 8 rational points might be applied to key extraction as attacker sides.
Original language | English |
---|---|
Title of host publication | Proceedings - 2019 7th International Symposium on Computing and Networking, CANDAR 2019 |
Publisher | IEEE |
Pages | 225-231 |
Number of pages | 7 |
ISBN (Electronic) | 9781728147253 |
DOIs | |
Publication status | Published - 2019 |
Event | 7th International Symposium on Computing and Networking, CANDAR 2019 - Nagasaki, Japan Duration: 26 Nov 2019 → 29 Nov 2019 |
Conference
Conference | 7th International Symposium on Computing and Networking, CANDAR 2019 |
---|---|
Country/Territory | Japan |
City | Nagasaki |
Period | 26/11/19 → 29/11/19 |
Keywords
- Curve25519
- microcontroller
- order 8 rational point
- side-channel attack