Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work

被引:6
|
作者
Wu, Keke [1 ]
Li, Huiyun [2 ]
Chen, Tingding [2 ]
Yu, Fengqi [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, Shenzhen Inst Adv Technol, Inst Comp Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Shenzhen, Peoples R China
关键词
Simple power analysis; Differential power analysis; Side channel; Elliptic curve cryptosystems;
D O I
10.1109/ISECS.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Simple Power Analysis (SPA), first introduced by Kocher et al. in [1], is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations. Although the possibility of attacking elliptic curve cryptosystems (ECC) by SPA repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual elliptic curve cryptosystems were successfully attacked and prevented. In this paper we describe power analysis experiments conducted on 3 implementations of elliptic curve cryptosystems. They are respectively binary, double-and-add-always and Montgomery methods of point multiplication. The experimental results indicate that using SPA analysis, the complete key material could be successfully retrieved from binary method, but not from double-and-add-always and Montgomery method.
引用
收藏
页码:21 / +
页数:2
相关论文
共 50 条
  • [31] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, AE
    Ei-Shennawy, K
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 213 - 222
  • [32] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200
  • [33] Fault analysis on elliptic curve cryptosystems with sliding window method
    Zhang, Jin-Zhong
    Kou, Ying-Zhan
    Wang, Tao
    Guo, Shi-Ze
    Zhao, Xin-Jie
    Tongxin Xuebao/Journal on Communications, 2012, 33 (01): : 71 - 78
  • [34] Some ways to secure elliptic curve cryptosystems
    Hedabou, Mustapha
    Beneteau, Lucien
    Pinel, Pierre
    ADVANCES IN APPLIED CLIFFORD ALGEBRAS, 2008, 18 (3-4) : 677 - 688
  • [35] Novel Precomputation Schemes for Elliptic Curve Cryptosystems
    Longa, Patrick
    Gebotys, Catherine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
  • [36] Verifiable threshold cryptosystems based on elliptic curve
    Han, YL
    Yang, YY
    Sun, J
    Li, DL
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337
  • [37] Exceptional procedure attack on elliptic curve cryptosystems
    Izu, T
    Takagi, T
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
  • [38] Differential fault attacks on elliptic curve cryptosystems
    Biehl, I
    Meyer, B
    Müller, V
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
  • [39] Some Ways to Secure Elliptic Curve Cryptosystems
    Mustapha Hedabou
    Lucien Bénéteau
    Pierre Pinel
    Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
  • [40] Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET: A Survey and Analysis
    Tellez, Felipe
    Ortiz, Jorge
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 1 - 12