Chosen message attacks method against ECC implementations
Chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications was proposed, where special input point P is chosen to have the features of special y-coordinate to generate noticeable variations on power consumption or other side-channel information, between...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.05.011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications was proposed, where special input point P is chosen to have the features of special y-coordinate to generate noticeable variations on power consumption or other side-channel information, between point doubling and addition operations, rendering distinguishable key bit information. Experimental results demonstrate that the proposed chosen message with simple side channel analysis method could effectively generate the noticeable variations. The method applies to the prime filed ECC cryptographic algorithms. |
---|---|
ISSN: | 1000-436X |