DocumentCode
2345668
Title
Power Analysis Attacks on ECC Randomized Automata
Author
Zhang, Fan ; Zhijie Jerry Shi
Author_Institution
Dept. of Comput. Sci. & Eng., Connecticut Univ.
fYear
2007
fDate
2-4 April 2007
Firstpage
900
Lastpage
901
Abstract
Power analysis can exploit the instantaneous power consumptions of elliptic curve cryptography (ECC) devices and retrieve secret keys. Many countermeasures have been proposed to make ECC implementations secure. One of the approaches is the randomized algorithms proposed by Oswald et al., which combine two scalar point multiplication algorithms and use random variables to decide which algorithm to follow at different stages of the computation. In this paper, we describe a power analysis attack that can break randomized automata proposed by Oswald et al. effectively, even with a small number of power traces
Keywords
automata theory; cryptography; power aware computing; randomised algorithms; elliptic curve cryptography; power analysis attacks; power consumption; random variables; randomized algorithm; randomized automata; Algorithm design and analysis; Automata; Computer science; Elliptic curve cryptography; Energy consumption; Power engineering and energy; Power generation; Public key; Random variables; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology, 2007. ITNG '07. Fourth International Conference on
Conference_Location
Las Vegas, NV
Print_ISBN
0-7695-2776-0
Type
conf
DOI
10.1109/ITNG.2007.152
Filename
4151803
Link To Document