• DocumentCode
    1753908
  • Title

    Simple power analysis attacks using chosen message against ECC hardware implementations

  • Author

    Li, Huiyun ; Wu, Keke ; Xu, Guoqing ; Yuan, Hai ; Luo, Peng

  • Author_Institution
    Shenzhen Institutes of Adv. Technol., Chinese Univ. of Hong Kong, Shenzhen, China
  • fYear
    2011
  • fDate
    21-23 Feb. 2011
  • Firstpage
    68
  • Lastpage
    72
  • Abstract
    Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair X and - X. However, the characteristics can not be applied to public-key cryptosystems based on scalar multiplications. This paper proposes novel chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications, where special input point P is chosen close to X-axis to generate noticeable variations for point doubling and point addition. The proposed attack can be applied to all standard implementations of the binary algorithms, both for left-to-right and right-to-left methods. This chosen-message method can also circumvent typical countermeasures such as the double-and-add-always algorithm.
  • Keywords
    public key cryptography; ECC hardware implementations; chosen message; double-and-add-always algorithm; modular exponentiation; public key cryptosystem; scalar multiplications; simple power analysis attacks; Elliptic curve cryptography; Elliptic curves; Hardware; Mathematical model; Power demand;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Security (WorldCIS), 2011 World Congress on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4244-8879-7
  • Electronic_ISBN
    978-0-9564263-7-6
  • Type

    conf

  • Filename
    5749885