Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work

被引:6
|
作者
Wu, Keke [1 ]
Li, Huiyun [2 ]
Chen, Tingding [2 ]
Yu, Fengqi [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, Shenzhen Inst Adv Technol, Inst Comp Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Shenzhen, Peoples R China
关键词
Simple power analysis; Differential power analysis; Side channel; Elliptic curve cryptosystems;
D O I
10.1109/ISECS.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Simple Power Analysis (SPA), first introduced by Kocher et al. in [1], is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations. Although the possibility of attacking elliptic curve cryptosystems (ECC) by SPA repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual elliptic curve cryptosystems were successfully attacked and prevented. In this paper we describe power analysis experiments conducted on 3 implementations of elliptic curve cryptosystems. They are respectively binary, double-and-add-always and Montgomery methods of point multiplication. The experimental results indicate that using SPA analysis, the complete key material could be successfully retrieved from binary method, but not from double-and-add-always and Montgomery method.
引用
收藏
页码:21 / +
页数:2
相关论文
共 50 条