Template Attacks on ECDSA

Elisabeth Oswald, Medweb Marcel

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices. Within these scenarios, they have proven to be the most powerful attacks. In this article we investigate how template attacks can be applied to implementations of an asymmetric cryptographic algorithm on a 32-bit platform. The asymmetric cryptosystem under scrutiny is the elliptic curve digital signature algorithm (ECDSA). ECDSA is particularly suitable for 32-bit platforms. In this article we show that even SPA resistant implementations of ECDSA on a typical 32-bit platform succumb to template-based SPA attacks. The only way to secure such implementations against template-based SPA attacks is to make them resistant against DPA attacks.
Translated title of the contributionTemplate Attacks on ECDSA
Original languageEnglish
Title of host publicationInformation Security Applications - WISA 2008
PublisherSpringer Berlin Heidelberg
Pages14-27
Volume5379
Publication statusPublished - 2008

Bibliographical note

ISBN: 9783642003059
Publisher: Springer LNCS 5379
Name and Venue of Conference: Information Security Applications - WISA 2008
Other identifier: 2001104

Fingerprint Dive into the research topics of 'Template Attacks on ECDSA'. Together they form a unique fingerprint.

Cite this