A refined power-analysis attack on elliptic curve cryptosystems

被引:0
|
作者
Goubin, L [1 ]
机构
[1] SchlumbergerSema, Crypto Lab CP8, F-78430 Louveciennes, France
关键词
public-key cryptography; side-channel attacks; power analysis; Differential Power Analysis (DPA); elliptic curves; smartcards;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Elliptic Curve Cryptosystems are becoming more and more popular and are included in many standards, an increasing demand has appeared for secure implementations that are not vulnerable to sidechannel attacks. To achieve this goal, several generic countermeasures against Power Analysis have been proposed in recent years. In particular, to protect the basic scalar multiplication - on an elliptic curve - against Differential Power Analysis (DPA), it has often been recommended using "random projective coordinates", "random elliptic curve isomorphisms" or "random field isomorphisms". So far, these countermeasures have been considered by many authors as a cheap and secure way of avoiding the DPA attacks on the "scalar multiplication" primitive. However we show in the present paper that, for many elliptic curves, such a DPA-protection of the "scalar" multiplication is not sufficient. In a chosen message scenario, a Power Analysis attack is still possible even if one of the three aforementioned countermeasures is used. We expose a new Power Analysis strategy that can be successful for a large class of elliptic curves, including most of the sample curves recommended by standard bodies such as ANSI, IEEE, ISO, NIST, SECG or WTLS. This result, means that the problem of randomizing the basepoint may be more difficult than expected and that "standard" techniques have still to be-improved, which may also have an impact on the performances of the implementations.
引用
收藏
页码:199 / 210
页数:12
相关论文
共 50 条
  • [31] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, A
    Ei-Shennawy, K
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 311 - 322
  • [32] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, AE
    Ei-Shennawy, K
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 213 - 222
  • [33] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200
  • [34] Simple power analysis on fast modular reduction with generalized Mersenne prime for elliptic curve cryptosystems
    Sakai, Y
    Sakurai, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 231 - 237
  • [35] Fault analysis on elliptic curve cryptosystems with sliding window method
    Zhang, Jin-Zhong
    Kou, Ying-Zhan
    Wang, Tao
    Guo, Shi-Ze
    Zhao, Xin-Jie
    Tongxin Xuebao/Journal on Communications, 2012, 33 (01): : 71 - 78
  • [36] Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
    Byrne, A.
    Meloni, N.
    Tisserand, A.
    Popovici, E. M.
    Marnane, W. P.
    JOURNAL OF COMPUTERS, 2007, 2 (10) : 52 - 62
  • [37] Dynamic Compensation Based Low-cost Power-analysis Countermeasure for Elliptic Curve Cryptography and Its Hardware Structure
    Li Wei
    Zeng Han
    Chen Tao
    Nan Longmei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (09) : 2439 - 2448
  • [38] Some ways to secure elliptic curve cryptosystems
    Hedabou, Mustapha
    Beneteau, Lucien
    Pinel, Pierre
    ADVANCES IN APPLIED CLIFFORD ALGEBRAS, 2008, 18 (3-4) : 677 - 688
  • [39] Novel Precomputation Schemes for Elliptic Curve Cryptosystems
    Longa, Patrick
    Gebotys, Catherine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
  • [40] Verifiable threshold cryptosystems based on elliptic curve
    Han, YL
    Yang, YY
    Sun, J
    Li, DL
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337