[ECC-11400] Timing Attack-Related Security Vulnerability
Description
ECC does not operate in a constant time when performing point multiplication, making it susceptible to timing attacks.
Workarounds
The ECC driver has randomized the power profile and made it appear constant time. This requires Secure Boot to be enabled for full effectiveness.
ESP-IDF has bypassed this issue in the following released versions.
ESP-IDF Release Branch |
Released Version |
---|---|
release/v5.4 and above |
|
release/v5.3 |
|
release/v5.2 |
|
release/v5.1 |
Solution
Fixed in chip revision v1.2. Chip revision v1.2 has introduced constant time and consumption mode, in which each point multiplication calculation consumes the same amount of time and power, able to effectively resist timing attacks.