Scan-Based Attack against Elliptic Curve Cryptosystems

被引:0
|
作者
Nara, Ryuta [1 ]
Togawa, Nozomu [1 ]
Yanagisawa, Masao [1 ]
Ohtsuki, Tatsuo [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.
引用
收藏
页码:402 / 407
页数:6
相关论文
共 50 条
  • [1] Scan-based Attack against DES Cryptosystems Using Scan Signatures
    Kodera, Hirokazu
    Yanagisawa, Masao
    Togawa, Nozomu
    2012 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2012, : 599 - 602
  • [2] A Scan-Based Attack Based on Discriminators for AES Cryptosystems
    Nara, Ryuta
    Togawa, Nozomu
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (12) : 3229 - 3237
  • [3] Scan-Based Side-Channel Attack against RSA Cryptosystems Using Scan Signatures
    Nara, Ryuta
    Satoh, Kei
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (12) : 2481 - 2489
  • [4] Secured Elliptic Curve Cryptosystems for Scan Based VLSI Architecture
    Sridhar, K. P.
    Raguram, M.
    Prakash, B.
    Koushighan, S.
    Saravanan, S.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [5] Exceptional procedure attack on elliptic curve cryptosystems
    Izu, T
    Takagi, T
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
  • [6] Scan-Based Attack against Trivium Stream Cipher Using Scan Signatures
    Fujishiro, Mika
    Yanagisawa, Masao
    Togawa, Nozomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07): : 1444 - 1451
  • [7] Scan-based Attack against Trivium Stream Cipher Independent of Scan Structure
    Fujishiro, Mika
    Yanagisawa, Masao
    Togawa, Nozomu
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2013,
  • [8] A Weil descent attack against elliptic curve cryptosystems over quartic extension fields
    Arita, Seigo
    Matsuo, Kazuto
    Nagao, Koh-ichi
    Shimura, Mahoro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1246 - 1254
  • [9] A Lightweight Scan Architecture against the Scan-based Side-channel Attack
    Wang, Xiangqi
    Gong, Xingxing
    Pan, Xianmin
    Wang, Weizheng
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2023, 23 (04) : 243 - 250
  • [10] Scan Attack on Elliptic Curve Cryptosystem
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 115 - 118