Simple power analysis of unified code for ECC double and add

36Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Classical formulae for point additions and point doublings on elliptic curves differ. This can make a side channel attack possible on a single EGG point multiplication by using simple power analysis (SPA) to observe the different times for the component point operations. Under the usual binary exponentiation algorithm, the deduced presence or absence of a point addition indicates a 1 or 0 respectively in the secret key, thus revealing the key in its entirety. Several authors have produced unified code for these operations in order to avoid this weakness. Although timing differences are thereby eliminated from this code level, it is shown that SPA attacks may still be possible on selected single point multiplications if there is sufficient side channel leakage at lower levels. Here a conditional subtraction in Montgomery modular multiplication (MMM) is assumed to give such leakage, but other modular multipliers may be equally susceptible to attack. The techniques are applicable to a single decryption or signature even under prior blinding of both the input text and the secret key. This means that one should use a constant time implementation of MMM even if the secret key is blinded or replaced every time, and all side channel leakage should be minimised, whatever multiplier is used. © International Association for Cryptologic Research 2004.

References Powered by Scopus

Differential power analysis

6055Citations
N/AReaders
Get full text

Elliptic curve cryptosystems

3806Citations
N/AReaders
Get full text

Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems

3406Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Power Analysis attacks: Revealing the secrets of smart cards

1815Citations
N/AReaders
Get full text

State-of-the-art of secure ECC implementations: A survey on known side-channel attacks and countermeasures

130Citations
N/AReaders
Get full text

An updated survey on secure ECC implementations: Attacks, countermeasures and cost

97Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Walter, C. D. (2004). Simple power analysis of unified code for ECC double and add. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3156, 191–204. https://doi.org/10.1007/978-3-540-28632-5_14

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 27

68%

Researcher 8

20%

Professor / Associate Prof. 3

8%

Lecturer / Post doc 2

5%

Readers' Discipline

Tooltip

Computer Science 26

68%

Engineering 7

18%

Mathematics 3

8%

Physics and Astronomy 2

5%

Save time finding and organizing research with Mendeley

Sign up for free