To infinity and beyond: Combined attack on ECC using points of low order

28Citations
Citations of this article
51Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low order. Using side channel information we deduce when the point at infinity occurs during the scalar multiplication, which leaks information about the secret key. In the best case, our attack breaks a simple and differential side channel analysis resistant implementation with input/output point validity and curve parameter checks using a single query. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Fan, J., Gierlichs, B., & Vercauteren, F. (2011). To infinity and beyond: Combined attack on ECC using points of low order. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6917 LNCS, pp. 143–159). https://doi.org/10.1007/978-3-642-23951-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free