Project information
Side channel analysis of elliptic curve cryptography on smart cards (ECSCA)

Information

This project doesn't include Faculty of Arts. It includes Faculty of Informatics. Official project website can be found on muni.cz.
Project Identification
MUNI/C/1701/2018
Project Period
2/2019 - 12/2019
Investor / Pogramme / Project type
Masaryk University
MU Faculty or unit
Faculty of Informatics
Project Website
https://neuromancer.sk/pyecsca/

Elliptic curves see more and more use in public key cryptography, mostly because of their performance and small key sizes. They are especially well fitted for low-resource devices such as smart-cards or embedded devices. However, the structure and complexity of elliptic curve cryptography makes it ripe for side-channel attacks like power-tracing, which uses fluctuations in physical emanations of a device, to break its security properties. We aim to develop a suite of mathematical tests for the verification of correctness of elliptic curve cryptography implementations together with an open-source toolkit for side-channel analysis of elliptic curve cryptography implementations. We will then use it to analyze resistance of elliptic curve cryptography implementations on programmable smart-cards to side-channel attacks.

Publications

Total number of publications: 1


You are running an old browser version. We recommend updating your browser to its latest version.