<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">

HOW TO ATTACK A PROVENLY SECURE ALGORITHM AND HARDEN IT THEREAFTER

Why do encryption algorithms, even if recognized as highly secure by the cryptographic community, show unexpected weaknesses? How does information need to be encrypted and corresponding algorithms modified, assuming that attackers are able to exploit side channels using high-precision measurement tools? 

A research team from Securosys and the University of Applied Science (HSR) in Rapperswil, Switzerland, worked on exactly these topics in a project supported by the Federal Commission for Technology and Innovation (CTI). The findings of this project are available now. In their report, the researchers from the Institute of Microelectronics and Embedded Systems (IMES) and Securosys show, how an elliptic-curve-based (ECC) algorithm is successfully attacked at first, and how slight modifications lead to robustness against side-channel attacks.

Whitepaper: On Power-Analysis Resistant Hardware Implementations of ECC-based Cryptosystems
Roman Willi, Paul Zbinden (IMES HSR) and Andreas Curiger (Securosys).

Project supported by the Federal Commission for Technology and Innovation (CTI).

Download the Whitepaper

 

Contact us

Contact us if you want to know more about our products and offering.
Contact us