Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (4): 56-63.doi: 10.11959/j.issn.2909-109x.2016.00025

• Papers • Previous Articles     Next Articles

Research and simulation of timing attacks on ECC

Hui-hui JIA1,Chao WANG2,Jian GU1,Hao-hao SONG1,Di TANG1   

  1. 1 The Third Research Institute of Ministry of Public Security,Shanghai 200031,China
    2 Shanghai University Key Lab of Specialty Fiber Optics and Optical Access Network,Shanghai 200072,China
  • Revised:2016-02-07 Online:2016-04-01 Published:2016-05-25
  • Supported by:
    Key Program of National Natural Science Foundation of China(61332019);The National Natural Science Foundation of China(61572304);The National Natural Science Foundation of China(61272056);The Technical Standard of Shanghai Science and Technology Innova-tion Action Plan(13DZ0500501)


Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.

Key words: side channel attack, timing attack, hidden Markov model, elliptic curve cryptography

CLC Number: 

No Suggested Reading articles found!