Dataset Open Access

REASSURE (H2020 731591) ECC Dataset

Lukasz Chmielewski


Dublin Core Export

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
  <dc:creator>Lukasz Chmielewski</dc:creator>
  <dc:date>2020-01-16</dc:date>
  <dc:description>Datasets collection for ECC (C25519) side-channel traces, as part of REASSURE H2020 731591 project.

The set “REASSURE_c25519_arithm_6k + PatternExtract From 5997 traces + StaticAlign.trs” contains electromagnetic traces coming from 5997 executions of Curve25519 $\mu$NaCl Montgomery Ladder scalar multiplication:
http://munacl.cryptojedi.org/curve25519-cortexm0.shtml
running on the Pi\~{n}ata target:
https://www.riscure.com/product/pinata-training-target/
which is a 32-bit STM32F4 microcontroller with an ARM-based architecture, running at the clock frequency of 168 MHz.

The implementation employs arithmetic-based conditional swap and is additionally protected with projective coordinate re-randomization and scalar randomization.
Each trace from the dataset represent a single iteration of the Montgomery Ladder scalar multiplication that is cut from the whole execution trace; such trace is labeled with the corresponding cswap condition bit.
Observe that a full scalar can be trivially recovered from the cswap condition bits used in the 255 Montgomery Ladder iterations.
Furthermore, all these cut traces (5997*255=1529235) are aligned to exploit the leakage efficiently.
Details about the implementation and how the traces are aligned are in:
https://eprint.iacr.org/2016/923.pdf

The set “REASSURE_c25519_arithm_6k + PatternExtract From 100 traces + StaticAlign.trs” contains a part of the 5997 set, but limited to the first 100 full traces.

The set “REASSURE_c25519_arithm_6k_100 full traces.trs” contains the full 100 traces (before division).

Each traces is in the TRS format that is described under the following links:
https://github.com/Riscure/python-trsfile
https://github.com/Riscure/java-trsfile
https://github.com/Riscure/Jlsca

Moreover, note that each trs file include a short description inside the file itself.</dc:description>
  <dc:description>Contact: chmielewski@riscure.com</dc:description>
  <dc:identifier>https://zenodo.org/record/3609789</dc:identifier>
  <dc:identifier>10.5281/zenodo.3609789</dc:identifier>
  <dc:identifier>oai:zenodo.org:3609789</dc:identifier>
  <dc:relation>info:eu-repo/grantAgreement/EC/H2020/731591/</dc:relation>
  <dc:relation>doi:10.5281/zenodo.3609788</dc:relation>
  <dc:relation>url:https://zenodo.org/communities/reassure</dc:relation>
  <dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
  <dc:rights>https://creativecommons.org/licenses/by/4.0/legalcode</dc:rights>
  <dc:subject>reassure</dc:subject>
  <dc:subject>side-channel attack</dc:subject>
  <dc:subject>ecc</dc:subject>
  <dc:subject>c25519</dc:subject>
  <dc:subject>cryptography</dc:subject>
  <dc:subject>physical security</dc:subject>
  <dc:title>REASSURE (H2020 731591) ECC Dataset</dc:title>
  <dc:type>info:eu-repo/semantics/other</dc:type>
  <dc:type>dataset</dc:type>
</oai_dc:dc>
331
143
views
downloads
All versions This version
Views 331331
Downloads 143143
Data volume 790.8 GB790.8 GB
Unique views 293293
Unique downloads 6464

Share

Cite as