Title :
Simple power analysis attacks using chosen message against ECC hardware implementations
Author :
Li, Huiyun ; Wu, Keke ; Xu, Guoqing ; Yuan, Hai ; Luo, Peng
Author_Institution :
Shenzhen Institutes of Adv. Technol., Chinese Univ. of Hong Kong, Shenzhen, China
Abstract :
Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair X and - X. However, the characteristics can not be applied to public-key cryptosystems based on scalar multiplications. This paper proposes novel chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications, where special input point P is chosen close to X-axis to generate noticeable variations for point doubling and point addition. The proposed attack can be applied to all standard implementations of the binary algorithms, both for left-to-right and right-to-left methods. This chosen-message method can also circumvent typical countermeasures such as the double-and-add-always algorithm.
Keywords :
public key cryptography; ECC hardware implementations; chosen message; double-and-add-always algorithm; modular exponentiation; public key cryptosystem; scalar multiplications; simple power analysis attacks; Elliptic curve cryptography; Elliptic curves; Hardware; Mathematical model; Power demand;
Conference_Titel :
Internet Security (WorldCIS), 2011 World Congress on
Conference_Location :
London
Print_ISBN :
978-1-4244-8879-7
Electronic_ISBN :
978-0-9564263-7-6