Power attack and evaluation on elliptic curve cryptosystem in a commercial smart card

Annv Liu, An Wang*, Yongyin Dong, Ying Shi, Caisen Chen, Guoshuang Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Elliptic Curve Cryptography (ECC) is a widely used cryptographic algorithm in our life. Although its theory has become one of the focuses, it is difficult to ensure its security during the process of implementation. One can break it easily by using side-channel attack such as power attack. In this paper, a key recovery platform is built with computer, filter, signal acquisition module, oscilloscope, and so on. Then, we implement the simple power attack on ECC, and employ self-correlation analysis to make it easy to recover the secret key automatically. Finally, some relevant and effective countermeasures are suggested against power attacks.

Original languageEnglish
Title of host publicationProceedings - 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages354-359
Number of pages6
ISBN (Electronic)9781728125411
DOIs
Publication statusPublished - Oct 2019
Event2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019 - Guilin, China
Duration: 17 Oct 201919 Oct 2019

Publication series

NameProceedings - 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019

Conference

Conference2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019
Country/TerritoryChina
CityGuilin
Period17/10/1919/10/19

Keywords

  • Elliptic Curve Cryptography
  • Self-correlation analysis
  • Side-channel analysis
  • Simple power attack

Fingerprint

Dive into the research topics of 'Power attack and evaluation on elliptic curve cryptosystem in a commercial smart card'. Together they form a unique fingerprint.

Cite this