Presentation | 2002/3/12 A Hybrid Hardware Attack Surpasses Side Channel and Fault Attacks Katsuyuki OKEYA, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We propose a hybrid hardware attack (fault-power attack) combining side channel and fault attacks that is more powerful than either side channel or fault attack alone. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. A fault attack is one that takes advantage of output when errors occur or incorrect values are inputted. The current elliptic scalar multiplication of the x-coordinate-only trick can prevent side channel attacks, but its ability to prevent fault attacks is unknown. We propose an elliptic scalar multiplication method using the x-coordinate-only trick, which is immune to known side channel and fault attacks. However, this countermeasure is vulnerable to the fault-power attack, which pins the pseudo-random number generator in the scalar multiplication using faults, and detects the scalar using power analysis. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Elliptic Curve Cryptosystem / Side Channel Attacks / Fault Attack / Fault-Power Attack / x-Coordinate-Only Trick |
Paper # | ITS2001-151 |
Date of Issue |
Conference Information | |
Committee | ITS |
---|---|
Conference Date | 2002/3/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Intelligent Transport Systems Technology (ITS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Hybrid Hardware Attack Surpasses Side Channel and Fault Attacks |
Sub Title (in English) | |
Keyword(1) | Elliptic Curve Cryptosystem |
Keyword(2) | Side Channel Attacks |
Keyword(3) | Fault Attack |
Keyword(4) | Fault-Power Attack |
Keyword(5) | x-Coordinate-Only Trick |
1st Author's Name | Katsuyuki OKEYA |
1st Author's Affiliation | Hitachi, Ltd., Systems Development Laboratory() |
2nd Author's Name | Kouichi SAKURAI |
2nd Author's Affiliation | Graduate School of Information Science Electrical Engineering, Kyushu University |
Date | 2002/3/12 |
Paper # | ITS2001-151 |
Volume (vol) | vol.101 |
Number (no) | 732 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |