Key-dependent multiplication leads to key extraction through measuring power consumption
Description
Key-dependent multiplication leads to key extraction through measuring power consumptionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
ECC Multiplication (MITRE EMB3D PID-11)
ECC Multiplication (MITRE EMB3D PID-11)
Private Key (MITRE EMB3D PID-12)
Attack Vectors
SCA
Power Side-Channel (MITRE EMB3D TID-101)
Defenses
Constant-time/flow implementation, Double and add always, Montgomery ladder