ORSHIN Attack Defense Framework

Key-dependent multiplication leads to key extraction through measuring power consumption

Description

Key-dependent multiplication leads to key extraction through measuring power consumption

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

ECC (MITRE EMB3D PID-11)

ECC Multiplication (MITRE EMB3D PID-11)

ECC Multiplication (MITRE EMB3D PID-11)

Private Key (MITRE EMB3D PID-12)

Attack Vectors

SCA

Power Side-Channel (MITRE EMB3D TID-101)

Defenses

Constant-time/flow implementation, Double and add always, Montgomery ladder