Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work

被引:6
|
作者
Wu, Keke [1 ]
Li, Huiyun [2 ]
Chen, Tingding [2 ]
Yu, Fengqi [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, Shenzhen Inst Adv Technol, Inst Comp Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Shenzhen, Peoples R China
关键词
Simple power analysis; Differential power analysis; Side channel; Elliptic curve cryptosystems;
D O I
10.1109/ISECS.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Simple Power Analysis (SPA), first introduced by Kocher et al. in [1], is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations. Although the possibility of attacking elliptic curve cryptosystems (ECC) by SPA repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual elliptic curve cryptosystems were successfully attacked and prevented. In this paper we describe power analysis experiments conducted on 3 implementations of elliptic curve cryptosystems. They are respectively binary, double-and-add-always and Montgomery methods of point multiplication. The experimental results indicate that using SPA analysis, the complete key material could be successfully retrieved from binary method, but not from double-and-add-always and Montgomery method.
引用
收藏
页码:21 / +
页数:2
相关论文
共 50 条
  • [21] Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
    De Mulder, E.
    Oers, S. B.
    Preneel, B.
    Verbauwhede, I.
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) : 367 - 382
  • [22] Elliptic Curve Cryptosystems in the Presence of Faults
    Joye, Marc
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 73 - 73
  • [23] Efficient algorithms for elliptic curve cryptosystems
    Guajardo, J
    Paar, C
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 342 - 356
  • [24] A systolic architecture for elliptic curve cryptosystems
    Tsai, WC
    Wang, SJ
    2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, 2000, : 591 - 597
  • [25] Modulus search for elliptic curve cryptosystems
    Koyama, K
    Tsuruoka, Y
    Kunihiro, N
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 1 - 7
  • [26] Kleptographic Attacks on Elliptic Curve Cryptosystems
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215
  • [27] Secure and Compact Elliptic Curve Cryptosystems
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 639 - 650
  • [28] Cryptosystems based on elliptic curve pairing
    Okamoto, E
    Okamoto, T
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, 3558 : 13 - 23
  • [29] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [30] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, A
    Ei-Shennawy, K
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 311 - 322