网络与信息安全学报2016,Vol.2Issue(4):56-63,8.DOI:10.11959/j.issn.2909-109x.2016.00025
ECC计时攻击研究与仿真
Research and simulation of timing attacks on ECC
摘要
Abstract
Based on the hidden Markov model (HMM) idea, a timing attack on the elliptic curve digital signature system, which adopted the “double-and-add” scalar multiplication, was proposed. Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully. The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data, and is easy to imple-ment at a high success rate.关键词
侧信道攻击/计时攻击/隐马尔可夫模型/椭圆曲线密码Key words
side channel attack/timing attack/hidden Markov model/elliptic curve cryptography分类
计算机与自动化引用本文复制引用
贾徽徽,王潮,顾健,宋好好,唐迪..ECC计时攻击研究与仿真[J].网络与信息安全学报,2016,2(4):56-63,8.基金项目
国家自然科学基金资助重点项目(No.61332019);国家自然科学基金资助项目(No.61572304, No.61272056);上海科委科技创新行动计划技术标准基金资助项目(No.13DZ0500501)Foundation Items:Key Program of National Natural Science Foundation of China (No.61332019), The National Natural Sci-ence Foundation of China (No.61572304, No.61272056), The Technical Standard of Shanghai Science and Technology Innova-tion Action Plan (No.13DZ0500501) (No.61332019)