Title : 
Simple power analysis attacks using chosen message against ECC hardware implementations
         
        
            Author : 
Li, Huiyun ; Wu, Keke ; Xu, Guoqing ; Yuan, Hai ; Luo, Peng
         
        
            Author_Institution : 
Shenzhen Institutes of Adv. Technol., Chinese Univ. of Hong Kong, Shenzhen, China
         
        
        
        
        
        
            Abstract : 
Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair X and - X. However, the characteristics can not be applied to public-key cryptosystems based on scalar multiplications. This paper proposes novel chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications, where special input point P is chosen close to X-axis to generate noticeable variations for point doubling and point addition. The proposed attack can be applied to all standard implementations of the binary algorithms, both for left-to-right and right-to-left methods. This chosen-message method can also circumvent typical countermeasures such as the double-and-add-always algorithm.
         
        
            Keywords : 
public key cryptography; ECC hardware implementations; chosen message; double-and-add-always algorithm; modular exponentiation; public key cryptosystem; scalar multiplications; simple power analysis attacks; Elliptic curve cryptography; Elliptic curves; Hardware; Mathematical model; Power demand;
         
        
        
        
            Conference_Titel : 
Internet Security (WorldCIS), 2011 World Congress on
         
        
            Conference_Location : 
London
         
        
            Print_ISBN : 
978-1-4244-8879-7
         
        
            Electronic_ISBN : 
978-0-9564263-7-6