首页> 外文会议>International symposium on electronic commerce and security >Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work
【24h】

Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work

机译:椭圆曲线密码系统简单的功率分析及对策:实用工作

获取原文

摘要

Simple Power Analysis (SPA), first introduced by Kocher et al. in [1], is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations. Although the possibility of attacking elliptic curve cryptosystems (ECC) by SPA repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual elliptic curve cryptosystems were successfully attacked and prevented. In this paper we describe power analysis experiments conducted on 3 implementations of elliptic curve cryptosystems. They are respectively binary, double-and-add-always and Montgomery methods of point multiplication. The experimental results indicate that using SPA analysis, the complete key material could be successfully retrieved from binary method, but not from double-and-add-always and Montgomery method.
机译:简单的功率分析(SPA),首先由Kocher等人引入。在[1]中,是一种涉及直接解释在加密操作期间收集的功耗测量的技术。虽然SPA攻击椭圆曲线密码系统(ECC)的可能性反复出现在研究论文中,但所有可访问的参考文献都避免了报告的确定实验的本质,其中实际的椭圆曲线密码系统成功攻击和预防。在本文中,我们描述了在椭圆曲线密码系统的3种实施中进行的功率分析实验。它们分别是二进制,双加和加入始终和蒙哥迈尔德的点乘法方法。实验结果表明,使用SPA分析,可以从二进制方法成功检索完整的关键材料,而不是从双加和始终和蒙哥马利方法中取出。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号