Title
Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor
Abstract
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Year
DOI
Venue
2016
10.1145/2996366.2996371
TIS@CCS
Keywords
Field
DocType
Elliptic Curve Cryptography, Scalar Multiplication, Side Channel Countermeasures, ARM Cortex M3 Processor
Montgomery ladder,ARM architecture,Scalar multiplication,Sliding window protocol,Wireless,Computer science,Scalar (physics),Real-time computing,Side channel attack,Computer hardware,Elliptic curve cryptography
Conference
ISBN
Citations 
PageRank 
978-1-4503-4575-0
0
0.34
References 
Authors
7
2
Name
Order
Citations
PageRank
Jacek Samotyja110.77
Kerstin Lemke-rust222416.43