The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate

Kotaro ABE, Makoto IKEDA

  • Full Text Views

    0

  • Cite this

Summary :

In this work, template attacks that aimed to leak the nonce were performed on 256-bit ECDSA hardware to evaluate the resistance against side-channel attacks. The target hardware was an ASIC and was revealed to be vulnerable to the combination of template attacks and lattice attacks. Furthermore, the attack result indicated it was not enough to fix the MSB of the nonce to 1 which is a common countermeasure. Also, the success rate of template attacks was estimated by simulation. This estimation does not require actual hardware and enables us to test the security of the implementation in the design phase. To clarify the acceptable amount of the nonce leakage, the computational cost of lattice attacks was compared to that of ρ method which is a cryptanalysis method. As a result, the success rate of 2-bit leakage of the nonce must be under 62% in the case of 256-bit ECDSA. In other words, SNR must be under 2-4 in our simulation model.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E107-A No.3 pp.575-582
Publication Date
2024/03/01
Publicized
2023/08/31
Online ISSN
1745-1337
DOI
10.1587/transfun.2023VLP0010
Type of Manuscript
Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category
VLSI Design Technology and CAD

Authors

Kotaro ABE
  The University of Tokyo
Makoto IKEDA
  The University of Tokyo

Keyword