Title
Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
Abstract
Security of embedded devices is a constant challenge due to the development of new and powerful side-channel attack techniques. This paper proposed a new profiling method to attack ECC implementation with combing method, which utilizes the leakage of modular multiplication during adding operations on points. We analyze the decryption of SM2 in a smart IC card with Riscure's platform, and present how to improve the SNR of the power traces during real attack situation. Experiment results show that the maximum success rate of template matching can reach to 100%, which means if an adversary gets the template data he can easily recover the 256-bits private key of SM2 by measurement only one trace, which means key blinding can't defend this attack.
Year
DOI
Venue
2016
10.1109/CIS.2016.0061
2016 12th International Conference on Computational Intelligence and Security (CIS)
Keywords
Field
DocType
Side Channel Attack,Template Attack,SM2,Combing Method,Modular Multiplication
Template matching,Elliptic Curve Digital Signature Algorithm,Computer science,Profiling (computer programming),Smart card,Artificial intelligence,Computer hardware,Public-key cryptography,Distributed computing,Modular arithmetic,Elliptic curve point multiplication,Elliptic curve cryptography,Machine learning
Conference
ISBN
Citations 
PageRank 
978-1-5090-4841-0
0
0.34
References 
Authors
2
5
Name
Order
Citations
PageRank
Kun Jiang101.01
Bing Zhao211.64
Weijun Shan301.69
Lihui Wang402.37
Jing Liu500.68