Scan-Based Attack against Elliptic Curve Cryptosystems

被引:0
|
作者
Nara, Ryuta [1 ]
Togawa, Nozomu [1 ]
Yanagisawa, Masao [1 ]
Ohtsuki, Tatsuo [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.
引用
收藏
页码:402 / 407
页数:6
相关论文
共 50 条
  • [31] Energy Efficiency Analysis of Elliptic Curve based Cryptosystems
    Banerjee, Tanushree
    Hasan, M. Anwar
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1579 - 1583
  • [32] A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem
    Kamal, Abdel Alim
    Youssef, Amr M.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 402 - 409
  • [33] Reconfigurable elliptic curve cryptosystems on a chip
    Cheung, RCC
    Luk, W
    Cheung, PYK
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 24 - 29
  • [34] Elliptic Curve Cryptosystems in the Presence of Faults
    Joye, Marc
    2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 73 - 73
  • [35] Efficient algorithms for elliptic curve cryptosystems
    Guajardo, J
    Paar, C
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 342 - 356
  • [36] A systolic architecture for elliptic curve cryptosystems
    Tsai, WC
    Wang, SJ
    2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, 2000, : 591 - 597
  • [37] Modulus search for elliptic curve cryptosystems
    Koyama, K
    Tsuruoka, Y
    Kunihiro, N
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 1 - 7
  • [38] Kleptographic Attacks on Elliptic Curve Cryptosystems
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215
  • [39] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [40] Secure and Compact Elliptic Curve Cryptosystems
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 639 - 650