首页> 外文会议>International Conference on Information Science and Electronic Technology >A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
【24h】

A Novel SPA Attack on ECC Using MMM's Conditional Subtraction

机译:使用MMM条件减法对ECC的新型SPA攻击

获取原文

摘要

Elliptic curve cryptosystems (ECCs) are becoming more popular because of the reduced number of key bits required in comparison to other cryptosystems such as RSA. They are especially suited to smartcards because of the limited memory and computational power available on these devices. However, the side-channel attacks especially simple side-channel analysis (SPA) can obtain information about the cryptosystem by measuring power consumption and processing time. To resist this attack there appear a number of countermeasures and the most widely used methods are Montgomery ladder and double-and-add-always algorithm. This paper proposes a novel simple power analysis attack to these countermeasures. Experimental results on smart cards demonstrate that this attack method can retrieve secret keys by distinguishing the conditional subtraction of Montgomery modular multiplication (MMM). Several countermeasures that can resist this kind of SPA attack are also demonstrated in this paper.
机译:椭圆曲线密码系统(ECC)正变得越来越受欢迎,因为与其他Cryptosystem(如RSA)相比,所需的关键比特数量缩短。 由于这些设备上可用的内存和计算能力有限,它们特别适合智能卡。 然而,通过测量功耗和处理时间,侧通道攻击特别简单的侧通道分析(SPA)可以获得有关密码系统的信息。 为了抵制这种攻击,出现了许多对策,最广泛使用的方法是蒙哥马利梯子和双加添加始终算法。 本文提出了一种对这些对策的简单功率分析攻击。 智能卡上的实验结果表明,通过区分蒙哥马利模块化乘法(MMM)的条件减法,该攻击方法可以检索秘密键。 本文还证明了可以抵抗这种SPA攻击的几种对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号