All Projects → J08nY → pyecsca

J08nY / pyecsca

Licence: MIT License
Python Elliptic Curve Side-Channel Analysis toolkit.

Programming Languages

python
139335 projects - #7 most used programming language
Makefile
30231 projects

Projects that are alternatives of or similar to pyecsca

cpu-load-side-channel
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+95.65%)
Mutual labels:  side-channel, side-channel-attacks
noble-ed25519
Fastest JS implementation of ed25519, x25519 & ristretto255. Independently audited, high-security, 0-dependency EDDSA signatures and ECDH key agreement
Stars: ✭ 220 (+856.52%)
Mutual labels:  ecc, elliptic-curve-cryptography
noble-secp256k1
Fastest JS implementation of secp256k1. Independently audited, high-security, 0-dependency ECDSA & Schnorr signatures.
Stars: ✭ 313 (+1260.87%)
Mutual labels:  ecc, elliptic-curve-cryptography
sicak
SIde-Channel Analysis toolKit: embedded security evaluation tools
Stars: ✭ 17 (-26.09%)
Mutual labels:  side-channel, side-channel-attacks
sgx-tutorial-space18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (+91.3%)
Mutual labels:  side-channel
galois
A performant NumPy extension for Galois fields and their applications
Stars: ✭ 106 (+360.87%)
Mutual labels:  elliptic-curve-cryptography
dvdisaster
A tool providing additional ECC protection for optical media (unofficial version)
Stars: ✭ 116 (+404.35%)
Mutual labels:  ecc
ParPar
High performance PAR2 create client for NodeJS
Stars: ✭ 110 (+378.26%)
Mutual labels:  ecc
scared
Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and merge request must be done through Gitlab project.
Stars: ✭ 44 (+91.3%)
Mutual labels:  side-channel
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+2604.35%)
Mutual labels:  sca
elliptic-curve
A polymorphic interface for elliptic curve operations
Stars: ✭ 37 (+60.87%)
Mutual labels:  ecc
Log4j-CVE-Detect
Detections for CVE-2021-44228 inside of nested binaries
Stars: ✭ 33 (+43.48%)
Mutual labels:  sca
wat
WAT - Windows ACME Tool
Stars: ✭ 28 (+21.74%)
Mutual labels:  ecc
nim-blscurve
Nim implementation of BLS signature scheme (Boneh-Lynn-Shacham) over Barreto-Lynn-Scott (BLS) curve BLS12-381
Stars: ✭ 19 (-17.39%)
Mutual labels:  elliptic-curve-cryptography
js
Elliptic Curve Integrated Encryption Scheme for secp256k1 in TypeScript
Stars: ✭ 64 (+178.26%)
Mutual labels:  elliptic-curve-cryptography
littleca
littleca是一个基于BC的小型ca库,支持ecc,rsa,dsa,sm2的证书签发,加密解密,签名验签操作,支持国密加解密,证书签发
Stars: ✭ 44 (+91.3%)
Mutual labels:  ecc
vulnerability-db
Vulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
Stars: ✭ 36 (+56.52%)
Mutual labels:  sca
python-bchlib
BCH library C Python module
Stars: ✭ 58 (+152.17%)
Mutual labels:  ecc
sidefuzz
Fuzzer to automatically find side-channel (timing) vulnerabilities
Stars: ✭ 94 (+308.7%)
Mutual labels:  side-channel
pairing
Optimised bilinear pairings over elliptic curves
Stars: ✭ 44 (+91.3%)
Mutual labels:  ecc

docs License MIT Test Lint Codecov DeepSource

Python Elliptic Curve cryptography Side-Channel Analysis toolkit.

For more info, see the docs.

Functionality

pyecsca aims to fill a gap in SCA tooling for Elliptic Curve Cryptography, it focuses on black-box implementations of ECC and presents a way to extract implementation information about a black-box implementation of ECC through side-channels. The main goal of pyecsca is to be able to reverse engineer the curve model, coordinate system, addition formulas, scalar multiplier and even finite-field implementation details.

It is currently in an alpha stage of development and thus only provides:

  • Enumeration of millions of possible ECC implementation configurations (see notebook/configuration_space)
  • Simulation and execution tracing of key generation, ECDH and ECDSA (see notebook/simulation)
  • Synthesis of C implementations of ECC for embedded devices, given any implementation configuration (see notebook/codegen)
  • Trace acquisition using PicoScope/ChipWhisperer oscilloscopes (see notebook/measurement)
  • Trace processing capabilities, e.g. signal-processing, filtering, averaging, cutting, aligning (pyecsca.sca)
  • Trace visualization using holoviews and datashader (see notebook/visualization)

pyecsca consists of three packages:

Requirements

pyecsca contains data from the Explicit-Formulas Database by Daniel J. Bernstein and Tanja Lange. The data was partially changed, to make working with it easier.

It also supports working with Riscure Inspector trace sets, which are of a proprietary format.

Testing & Development

See the Makefile for tests, performance measurement, codestyle and type checking commands. Use black for code-formatting.

Docs

License

MIT License

Copyright (c) 2018-2021 Jan Jancar

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

Development is supported by the Masaryk University grant MUNI/C/1701/2018, this support is very appreciated.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].