Scan-Based Attack against Elliptic Curve Cryptosystems

被引:0
|
作者
Nara, Ryuta [1 ]
Togawa, Nozomu [1 ]
Yanagisawa, Masao [1 ]
Ohtsuki, Tatsuo [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.
引用
收藏
页码:402 / 407
页数:6
相关论文
共 50 条
  • [41] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, A
    Ei-Shennawy, K
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 311 - 322
  • [42] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, AE
    Ei-Shennawy, K
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 213 - 222
  • [43] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200
  • [44] Efficient identity based parameter selection for elliptic curve cryptosystems
    Lenstra, AK
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 294 - 302
  • [45] New Scan-Based Attack Using Only the Test Mode
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    Saeed, Samah Mohamed
    Karri, Ramesh
    2013 IFIP/IEEE 21ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2013, : 234 - 239
  • [46] Heterogenic distributed system for cryptanalysis of elliptic curve based cryptosystems
    Majkowski, Piotr
    Rawski, Mariusz
    Wojciechowski, Tomasz
    Kotulski, Zbigniew
    Wojtynski, Maciej
    ICSENG 2008: INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING, 2008, : 300 - 305
  • [47] LOW EXPONENT ATTACK AGAINST ELLIPTIC CURVE RSA
    KUROSAWA, K
    OKADA, K
    TSUJII, S
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 77 - 83
  • [48] Low exponent attack against elliptic curve RSA
    Kurosawa, E
    Okada, K
    Tsujii, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 376 - 383
  • [49] Robust Secure Scan Design Against Scan-Based Differential Cryptanalysis
    Shi, Youhua
    Togawa, Nozomu
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (01) : 176 - 181
  • [50] Partial Scan Design Against Scan-based Side Channel Attacks
    Chen, Xi
    Lu, Zhaojun
    Qu, Gang
    Cui, Aijiao
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1484 - 1489