Research and simulation of timing attacks on ECC

Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST)...

Full description

Bibliographic Details
Main Authors: Hui-hui JIA,Jian GU,Hao-hao SONG,Di TANG, Chao WANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2909-109x.2016.00025
Description
Summary:Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.
ISSN:2096-109X