• DocumentCode
    2345668
  • Title

    Power Analysis Attacks on ECC Randomized Automata

  • Author

    Zhang, Fan ; Zhijie Jerry Shi

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Connecticut Univ.
  • fYear
    2007
  • fDate
    2-4 April 2007
  • Firstpage
    900
  • Lastpage
    901
  • Abstract
    Power analysis can exploit the instantaneous power consumptions of elliptic curve cryptography (ECC) devices and retrieve secret keys. Many countermeasures have been proposed to make ECC implementations secure. One of the approaches is the randomized algorithms proposed by Oswald et al., which combine two scalar point multiplication algorithms and use random variables to decide which algorithm to follow at different stages of the computation. In this paper, we describe a power analysis attack that can break randomized automata proposed by Oswald et al. effectively, even with a small number of power traces
  • Keywords
    automata theory; cryptography; power aware computing; randomised algorithms; elliptic curve cryptography; power analysis attacks; power consumption; random variables; randomized algorithm; randomized automata; Algorithm design and analysis; Automata; Computer science; Elliptic curve cryptography; Energy consumption; Power engineering and energy; Power generation; Public key; Random variables; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology, 2007. ITNG '07. Fourth International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    0-7695-2776-0
  • Type

    conf

  • DOI
    10.1109/ITNG.2007.152
  • Filename
    4151803