Scan-Based Attack against Elliptic Curve Cryptosystems

被引:0
|
作者
Nara, Ryuta [1 ]
Togawa, Nozomu [1 ]
Yanagisawa, Masao [1 ]
Ohtsuki, Tatsuo [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.
引用
收藏
页码:402 / 407
页数:6
相关论文
共 50 条
  • [21] Scan-based Side-channel Attack against Symmetric Key Ciphers Using Scan Signatures
    Fujishiro, Mika
    Shi, Youhua
    Yanagisawa, Masao
    Togawa, Nozomu
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2015, : 309 - 312
  • [22] Resistance against differential power analysis for elliptic curve cryptosystems
    Coron, JS
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 292 - 302
  • [23] Security of elliptic curve cryptosystems
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 756 - 761
  • [24] ELLIPTIC CURVE CRYPTOSYSTEMS AND THEIR APPLICATIONS
    KOYAMA, K
    OKAMOTO, T
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1992, E75D (01) : 50 - 57
  • [25] THE IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS
    MENEZES, A
    VANSTONE, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 2 - 13
  • [26] Customizable elliptic curve cryptosystems
    Cheung, RCC
    Telle, NJB
    Luk, W
    Cheung, PYK
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (09) : 1048 - 1059
  • [27] ON THE IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS
    BENDER, A
    CASTAGNOLI, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 186 - 192
  • [28] Efficient elliptic curve cryptosystems
    Darweesh, Kamal
    Saleh, Mohammad
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2018, 9 (01): : 161 - 174
  • [29] Scan-based Attack on the LED Block Cipher Using Scan Signatures
    Fujishiro, Mika
    Yanagisawa, Masao
    Togawa, Nozomu
    2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 1460 - 1463
  • [30] Implementation of power attack analysis in ML algorithm circuit with elliptic curve cryptosystems
    Han, Yu
    Zou, Xuecheng
    Liu, Zhenglin
    Dan, Yongping
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (02): : 21 - 24