Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profilingopen access

Authors
Park, DongjunChoi, MinsigKim, GyusangBae, DaehyeonKim, HeeseokHong, Seokhie
Issue Date
1-Jan-2023
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Hardware; Power systems; Cryptocurrency; Side-channel attacks; Hamming weight; Elliptic curves; Symbols; hardware security; power analysis; side-channel attack
Citation
IEEE ACCESS, v.11, pp 44578 - 44589
Pages
12
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
11
Start Page
44578
End Page
44589
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/168245
DOI
10.1109/ACCESS.2023.3273150
ISSN
2169-3536
Abstract
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks have been widely studied in cryptanalysis and have already been proven threatening, but analysis on hardware wallets still needs to be researched. Although the previous work demonstrated several side-channel vulnerabilities, their attacks require a finely controlled environment or a learning phase of target devices' physical properties before the attacks. This paper proposes a side-channel attack on hardware wallets extracting private keys. The proposed attack needs a single power trace measured when wallets process elliptic curve scalar multiplication with private keys. Our attack is reasonable since we do not damage the device under attack and do not target a specific device but an algorithm; it is widely applicable to wallets using that algorithm or analogous ones. It also presents the attack results conducted with three datasets: simulation, ChipWhisperer, and actual dataset collected from the Trezor Model One, the first and representative hardware wallets which comply with the de facto standard of hardware wallets.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, HeeSeok photo

Kim, HeeSeok
Graduate School (Department of Cyber Security)
Read more

Altmetrics

Total Views & Downloads

BROWSE