Scan-based attack against elliptic curve cryptosystems

Ryuta Nara, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)

    Abstract

    Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.

    Original languageEnglish
    Title of host publicationProceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC
    Pages407-412
    Number of pages6
    DOIs
    Publication statusPublished - 2010
    Event2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010 - Taipei
    Duration: 2010 Jan 182010 Jan 21

    Other

    Other2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010
    CityTaipei
    Period10/1/1810/1/21

    Fingerprint

    Cryptography
    Networks (circuits)
    Public key cryptography
    Monitoring

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Computer Science Applications
    • Computer Graphics and Computer-Aided Design

    Cite this

    Nara, R., Togawa, N., Yanagisawa, M., & Ohtsuki, T. (2010). Scan-based attack against elliptic curve cryptosystems. In Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC (pp. 407-412). [5419848] https://doi.org/10.1109/ASPDAC.2010.5419848

    Scan-based attack against elliptic curve cryptosystems. / Nara, Ryuta; Togawa, Nozomu; Yanagisawa, Masao; Ohtsuki, Tatsuo.

    Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC. 2010. p. 407-412 5419848.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Nara, R, Togawa, N, Yanagisawa, M & Ohtsuki, T 2010, Scan-based attack against elliptic curve cryptosystems. in Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC., 5419848, pp. 407-412, 2010 15th Asia and South Pacific Design Automation Conference, ASP-DAC 2010, Taipei, 10/1/18. https://doi.org/10.1109/ASPDAC.2010.5419848
    Nara R, Togawa N, Yanagisawa M, Ohtsuki T. Scan-based attack against elliptic curve cryptosystems. In Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC. 2010. p. 407-412. 5419848 https://doi.org/10.1109/ASPDAC.2010.5419848
    Nara, Ryuta ; Togawa, Nozomu ; Yanagisawa, Masao ; Ohtsuki, Tatsuo. / Scan-based attack against elliptic curve cryptosystems. Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC. 2010. pp. 407-412
    @inproceedings{ba31a010e2694c3f81afd19912a6809e,
    title = "Scan-based attack against elliptic curve cryptosystems",
    abstract = "Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.",
    author = "Ryuta Nara and Nozomu Togawa and Masao Yanagisawa and Tatsuo Ohtsuki",
    year = "2010",
    doi = "10.1109/ASPDAC.2010.5419848",
    language = "English",
    isbn = "9781424457656",
    pages = "407--412",
    booktitle = "Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC",

    }

    TY - GEN

    T1 - Scan-based attack against elliptic curve cryptosystems

    AU - Nara, Ryuta

    AU - Togawa, Nozomu

    AU - Yanagisawa, Masao

    AU - Ohtsuki, Tatsuo

    PY - 2010

    Y1 - 2010

    N2 - Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.

    AB - Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography circuit. Public-key cryptography, such as RSA and elliptic curve cryptosystem (ECC), is extensively used but conventional scan-based attacks cannot be applied to it, because it has a complicated algorithm as well as a complicated architecture. This paper proposes a scan-based attack which enables us to decipher a secret key in ECC. The proposed method is based on detecting intermediate values calculated in ECC. By monitoring the 1-bit sequence in the scan path, we can find out the register position specific to the intermediate value in it and we can know whether this intermediate value is calculated or not in the target ECC circuit. By using several intermediate values, we can decipher a secret key. The experimental results demonstrate that a secret key in a practical ECC circuit can be deciphered using 29 points over the elliptic curve E within 40 seconds.

    UR - http://www.scopus.com/inward/record.url?scp=77951238809&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=77951238809&partnerID=8YFLogxK

    U2 - 10.1109/ASPDAC.2010.5419848

    DO - 10.1109/ASPDAC.2010.5419848

    M3 - Conference contribution

    SN - 9781424457656

    SP - 407

    EP - 412

    BT - Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC

    ER -