A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem - Université Jean-Monnet-Saint-Étienne Accéder directement au contenu
Communication Dans Un Congrès Année : 2015

A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem

Résumé

—In this paper, based on a thorough analysis of the state of the art, we point out a missing solution for embedded devices to secure the syndrome computation. We show that this weakness can open the door to a side-channel attack targeting the secret permutation. Indeed, brute-force attack iterations are dramatically decreased when the secret permutation is recovered. We demonstrate the feasibility of this attack against the McEliece cryptosystem implemented on an ARM Cortex-M3 microprocessor using Goppa codes. We explain how to recover the secret permutation on a toy example. Finally, we propose a promising countermeasure, which can be implemented in embedded devices to prevent this attack.
Fichier principal
Vignette du fichier
2015_Trudevice_Tania.pdf (275.66 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

ujm-01186639 , version 1 (25-08-2015)

Identifiants

  • HAL Id : ujm-01186639 , version 1

Citer

Tania Richmond, Martin Petrvalsky, Milos Drutarovsky. A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem. 3rd Workshop on trustworthy manufacturing and utilization of secure devices - TRUDEVICE 2015, Mar 2015, Grenoble, France. ⟨ujm-01186639⟩
129 Consultations
515 Téléchargements

Partager

Gmail Facebook X LinkedIn More