首页> 外文会议>International Conference on Computational Intelligence and Security >Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
【24h】

Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography

机译:关于椭圆曲线密码术的模块化乘法的分析攻击

获取原文

摘要

Security of embedded devices is a constant challenge due to the development of new and powerful side-channel attack techniques. This paper proposed a new profiling method to attack ECC implementation with combing method, which utilizes the leakage of modular multiplication during adding operations on points. We analyze the decryption of SM2 in a smart IC card with Riscure's platform, and present how to improve the SNR of the power traces during real attack situation. Experiment results show that the maximum success rate of template matching can reach to 100%, which means if an adversary gets the template data he can easily recover the 256-bits private key of SM2 by measurement only one trace, which means key blinding can't defend this attack.
机译:嵌入式设备的安全性是一种不断挑战,因为开发了新的和强大的侧频攻击技术。本文提出了一种采用梳理方法攻击ECC实现的新型分析方法,该方法利用模块化乘法在积分中添加了模块化倍增。我们分析了用Riscure平台的智能IC卡中SM2的解密,并在真正的攻击情况下提出了如何改善电力迹线的SNR。实验结果表明,模板匹配的最大成功率可以达到100%,这意味着如果对手获取模板数据,他可以通过测量轻松恢复SM2的256位私钥,这意味着密钥致盲可以'捍卫这种攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号