A refined power-analysis attack on elliptic curve cryptosystems

被引:0
|
作者
Goubin, L [1 ]
机构
[1] SchlumbergerSema, Crypto Lab CP8, F-78430 Louveciennes, France
关键词
public-key cryptography; side-channel attacks; power analysis; Differential Power Analysis (DPA); elliptic curves; smartcards;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Elliptic Curve Cryptosystems are becoming more and more popular and are included in many standards, an increasing demand has appeared for secure implementations that are not vulnerable to sidechannel attacks. To achieve this goal, several generic countermeasures against Power Analysis have been proposed in recent years. In particular, to protect the basic scalar multiplication - on an elliptic curve - against Differential Power Analysis (DPA), it has often been recommended using "random projective coordinates", "random elliptic curve isomorphisms" or "random field isomorphisms". So far, these countermeasures have been considered by many authors as a cheap and secure way of avoiding the DPA attacks on the "scalar multiplication" primitive. However we show in the present paper that, for many elliptic curves, such a DPA-protection of the "scalar" multiplication is not sufficient. In a chosen message scenario, a Power Analysis attack is still possible even if one of the three aforementioned countermeasures is used. We expose a new Power Analysis strategy that can be successful for a large class of elliptic curves, including most of the sample curves recommended by standard bodies such as ANSI, IEEE, ISO, NIST, SECG or WTLS. This result, means that the problem of randomizing the basepoint may be more difficult than expected and that "standard" techniques have still to be-improved, which may also have an impact on the performances of the implementations.
引用
收藏
页码:199 / 210
页数:12
相关论文
共 50 条
  • [41] Differential fault attacks on elliptic curve cryptosystems
    Biehl, I
    Meyer, B
    Müller, V
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
  • [42] Some Ways to Secure Elliptic Curve Cryptosystems
    Mustapha Hedabou
    Lucien Bénéteau
    Pierre Pinel
    Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
  • [43] Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET: A Survey and Analysis
    Tellez, Felipe
    Ortiz, Jorge
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 1 - 12
  • [44] Voting protocol based on elliptic curve cryptosystems
    Liu, Shengli
    Yang, Bo
    Wang, Yumin
    Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
  • [45] Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems
    Schmidt-Samoa, K
    Semay, O
    Takagi, T
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (01) : 48 - 57
  • [46] Multi-threading elliptic curve cryptosystems
    Kanniah, Uma S.
    Samsudin, Azman
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
  • [47] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
  • [48] A short course to introduce Elliptic Curve Cryptosystems
    Takagi, K
    Murayama, JK
    ADVANCED RESEARCH IN COMPUTERS AND COMMUNICATIONS IN EDUCATION, VOL 2: NEW HUMAN ABILITIES FOR THE NETWORKED SOCIETY, 1999, 55 : 874 - 875
  • [49] Implementation and Analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB
    Choi, Yong-Je
    Kim, Moo-Seop
    Lee, Hang-Rok
    Kim, Ho-Won
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 130 - 134
  • [50] Implementation of elliptic curve cryptosystems on a reconfigurable computer
    Nguyen, N
    Gaj, K
    Caliga, D
    El-Ghazawi, T
    2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 60 - 67