Authors:
Audrey Lucas
1
and
Arnaud Tisserand
2
Affiliations:
1
CNRS, IRISA UMR 6074, INRIA Centre Rennes - Bretagne Atlantique and Univ Rennes, Lannion and France
;
2
CNRS, Lab-STICC UMR 6285 and University South Britany, Lorient and France
Keyword(s):
Elliptic Curve Cryptography, Side Channel Attack, Fault Injection Attack, Protection, Countermeasure.
Related
Ontology
Subjects/Areas/Topics:
Data and Application Security and Privacy
;
Data Protection
;
Formal Methods for Security
;
Information and Systems Security
;
Security Deployment
;
Security in Information Systems
;
Software Security
Abstract:
Scalar multiplication is the main operation in elliptic curve cryptography. In embedded systems, it is vulnerable to both observation and perturbation attacks. Most of protections only target one of these two types of attacks. Unfortunately, many protections against one type of attack may reduce the protection against the other one. In this paper, we simultaneously deal with protections against both types of attacks. Two countermeasures are presented for scalar multiplication and implemented on a Cortex-M0 microcontroller. The first one protects finite field operations over point coordinates. The second one protects the scalar (or key) bits.