Vincent Verneuil
NXP Semiconductors
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vincent Verneuil.
international conference on information and communication security | 2010
Christophe Clavier; Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil
We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the Big Mac attack from Walter, longer keys may facilitate this analysis and success will depend on the arithmetic coprocessor characteristics. We present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to our attack. Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding. Also, contrarily to the Big Mac attack, it applies even in the case of regular implementations such as the square and multiply always or the Montgomery ladder. We also point out that DSA and Diffie-Hellman exponentiations are no longer immune against CPA. Then we discuss the efficiency of known countermeasures, and we finally present some new ones.
cryptographic hardware and embedded systems | 2011
Christophe Clavier; Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil
The recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on square-and-multiply always RSA exponentiation at CT-RSA 2011 have shown that collision-correlation power analysis is able to recover the secret keys on embedded implementations. However, we noticed that the attack published last year by Moradi et al. is not efficient on correctly first-order protected implementations. We propose in this paper improvements on collision-correlation attacks which require less power traces than classical second-order power analysis techniques.We present here two new methods and show in practice their real efficiency on two first-order protected AES implementations. We also mention that other symmetric embedded algorithms can be targeted by our new techniques.
international conference on cryptology in india | 2012
Christophe Clavier; Benoit Feix; Georges Gagnerot; Christophe Giraud; Mylène Roussellet; Vincent Verneuil
In most efficient exponentiation implementations, recovering the secret exponent is equivalent to disclosing the sequence of squaring and multiplication operations. Some known attacks on the RSA exponentiation apply this strategy, but cannot be used against classical blinding countermeasures. In this paper, we propose new attacks distinguishing squaring from multiplications using a single side-channel trace. It makes our attacks more robust against blinding countermeasures than previous methods even if both exponent and message are randomized, whatever the quality and length of random masks. We demonstrate the efficiency of our new techniques using simulations in different noise configurations.
international conference on cryptology in india | 2011
Christophe Clavier; Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil
Embedded exponentiation techniques have become a key concern for security and efficiency in hardware devices using public key cryptography. An exponentiation is basically a sequence of multiplications and squarings, but this sequence may reveal exponent bits to an attacker on an unprotected implementation. Although this subject has been covered for years, we present in this paper new exponentiation algorithms based on trading multiplications for squarings. Our method circumvents attacks aimed at distinguishing squarings from multiplications at a lower cost than previous techniques. Last but not least, we present new algorithms using two parallel squaring blocks which provide the fastest exponentiation to our knowledge.
international conference on progress in cryptology | 2013
Benoit Feix; Vincent Verneuil
In this paper, we study the fixed-point scalar multiplication operation on elliptic curves in the context of embedded devices prone to physical attacks. We propose efficient algorithms based on Yao and BGMW algorithms that are suited for embedded computing, with various storage-efficiency trade-offs. In particular, we study their security towards side-channel and fault analysis and propose a set of low-cost yet efficient countermeasures against these attacks.
Archive | 2010
Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil
Archive | 2012
Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil; Christophe Clavier
Archive | 2010
Benoit Feix; Georges Gagnerot; Mylène Roussellet; Vincent Verneuil
Archive | 2012
Christophe Clavier; Benoit Feix; Georges Gagnerot; Christophe Giraud; Vincent Verneuil
Archive | 2014
Benoit Feix; Vincent Verneuil; Christophe Clavier