...
【24h】

Zero-Value Register Attack on Elliptic Curve Cryptosystem

机译:椭圆曲线密码系统的零值寄存器攻击

获取原文
获取原文并翻译 | 示例

摘要

Differential power analysis (DPA) might break implementations of elliptic curve cryptosystem (ECC) on memory constraint devices. Goubin proposed a variant of DPA using a point (0, y), which is not randomized in Jacobian coordinates or in an isomorphic class. This point often exists in standardized elliptic curves, and we have to care this attack. In this paper, we propose zero-value register attack as an extension of Goubin's attack. Note that even if a point has no zero-value coordinate, auxiliary registers might take zero value. We investigate these zero-value registers that cannot be randomized by the above randomization. Indeed, we have found several points P = (x, y) which cause the zero-value registers, e.g., (1) 3x~2 + a = 0, (2) 5x~4+2ax~2 - 4bx + a~2 = 0, (3) P is y-coordinate self-collision point, etc. We demonstrate the elliptic curves recommended in SECG that have these points. Interestingly, some conditions required for zero-value register attack depend on explicit implementation of addition formulae — in order to resist this type of attacks, we have to care how to implement the addition formulae. Finally, we note that Goubin's attack and the proposed attack assume that a base point P can be chosen by attackers and a secret scalar d is fixed, so that they are not applicable to ECDSA.
机译:差分功率分析(DPA)可能会破坏内存约束设备上的椭圆曲线密码系统(ECC)的实现。古宾提出了一种使用点(0,y)的DPA变体,该点在Jacobian坐标或同构类中不是随机的。该点通常存在于标准椭圆曲线中,因此我们必须注意这种攻击。在本文中,我们提出零值寄存器攻击作为Goubin攻击的扩展。请注意,即使一个点没有零值坐标,辅助寄存器也可能取零值。我们调查了这些零值寄存器,这些寄存器不能通过上述随机化方法进行随机化。确实,我们发现了几个点P =(x,y)导致了零值寄存器,例如(1)3x〜2 + a = 0,(2)5x〜4 + 2ax〜2-4-4bx + a〜 2 = 0,(3)P是y坐标自碰撞点,等等。我们演示了SECG中推荐的具有这些点的椭圆曲线。有趣的是,零值寄存器攻击所需的某些条件取决于加法公式的显式实现-为了抵制此类攻击,我们必须关心如何实现加法公式。最后,我们注意到Goubin的攻击和建议的攻击假设攻击者可以选择一个基点P,并且秘密标量d是固定的,因此它们不适用于ECDSA。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号