Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryption in OpenSSL

    Tietoaineisto

    Description

    The dataset was used for Test Vector Leakage Assessment (TVLA) of SM2 decryption.
    The results are presented at ACSAC 2018 (https://www.acsac.org/2018/) in "Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study" (DOI: 10.1145/3274694.3274725).

    The dataset contains Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryption in OpenSSL.

    Folders Description

    EM_traces_before_countermeasures : contains EM traces that were taken on unprotected version of SM2 decryption;
    EM_traces_after_countermeasures : contains EM traces that were taken after all the countermeasures described in the paper were applied;
    Data Description

    These are Matlab generated files (.mat).
    Each file contains a single Matrix where each column represent an EM trace.
    The data type is double-precision floating-point (8-bytes).

    File Name Description

    TRACE_fixed* : contains traces with fixed key and fixed point (cipher text)
    TRACE_rand_key* : contains traces with random key and fixed point (cipher text)
    TRACE_rand_point* : contains traces with fixed key and random point (cipher text)
    Koska saatavilla3 jouluk. 2018
    JulkaisijaTampere University of Technology
    Tietojen luontipäivämäärämaalisk. 2018 - kesäk. 2018
    • Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study

      Tuveri, N., ul Hassan, S., Pereida Garcia, C. & Brumley, B., 3 jouluk. 2018, ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference. New York: ACM, s. 147-160 14 Sivumäärä

      Tutkimustuotos: Conference contributionScientificvertaisarvioitu

      Open access
      Tiedosto
      11 Sitaatiot (Scopus)
      59 Lataukset (Pure)

    Siteeraa tätä