Skip to content

Educational ECDSA implementation that is vulnerable to side-channel analysis

Notifications You must be signed in to change notification settings

sholtrop/chipwhisperer_lite_ecdsa_vuln

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

This is an educational implementation of the ECDSA algorithms for public key generation and signing messages with a private key, for the ChipWhisperer-Lite.

It is vulnerable by design to side-channel attacks to facilitate learning about them and analyzing them. See our jupyter/submit.ipynb Jupyter Notebook for an example of how to compile and flash the code and run the example.

Specifically, the elliptic curve multiplication function EccPoint_mult in firmware/crypto/micro-ecc-vulnerable/uECC.c is vulnerable: the amount of times EccPoint_add is called is dependent on the bits in the secret key. This means the secret key can be retrieved by both timing analysis and power analysis attacks.

About

Educational ECDSA implementation that is vulnerable to side-channel analysis

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published