Journal on Communications ›› 2014, Vol. 35 ›› Issue (5): 79-87.doi: 10.3969/j.issn.1000-436x.2014.05.011

• academic paper • Previous Articles     Next Articles

Chosen message attacks method against ECC implementations

Peng LUO1,2,Hui-yun LI3,Kun-peng WANG4,Ya-wei WANG5   

  1. 1 Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    2 University of Chinese Academy of Sciences, Beijing 100049, China
    3 Shenzhen Institutes of Advanced Technology, Shenzhen 518055, China
    4 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093,China
    5 HUADA INFOSEC, Beijing 100015,China
  • Online:2014-05-25 Published:2017-07-24
  • Supported by:
    The Fund of CAS Youth Exchange Promotion Association;The National High Technology Research and Development Program of China (863 Program)

Abstract:

Chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications was proposed, where special input point P is chosen to have the features of special y-coordinate to generate noticeable variations on power consumption or other side-channel information, between point doubling and addition operations, rendering distinguishable key bit information. Experimental results demonstrate that the proposed chosen message with simple side channel analysis method could effectively generate the noticeable variations. The method applies to the prime filed ECC cryptographic algorithms.

Key words: Elliptic curve cryptosystem, scalar multiplication, chosen message attack, side channel analysis

No Suggested Reading articles found!