a timing attack on hyperelliptic curve cryptosystems
play

A Timing Attack on Hyperelliptic Curve Cryptosystems Asiacrypt 2003 - PowerPoint PPT Presentation

A Timing Attack on Hyperelliptic Curve Cryptosystems Asiacrypt 2003 rump session on Dec. 2 nd , 2003 M.Katagi, I.Kitamura, T.Akishita, and T. Takagi(*) Sony Corporation (*)Technische Universitaet Darmstadt Introduction Optimization of


  1. A Timing Attack on Hyperelliptic Curve Cryptosystems Asiacrypt 2003 rump session on Dec. 2 nd , 2003 M.Katagi, I.Kitamura, T.Akishita, and T. Takagi(*) Sony Corporation (*)Technische Universitaet Darmstadt

  2. Introduction � Optimization of addition algorithm for HECC � Active area ! � Harley Algorithm (Explicit Formulae) � Side Channel Attacks (SCA) for HECC � Important, but not enough studied...

  3. Experimental Results � Timings of scalar multiplication � Detect the timing difference on PC! � Intel Xeon Processor 2.80GHz � Linux 2.4 (RedHat) � gcc3.3 and NTL5.3 with GMP4.0 Timing Addition Formulae Harley 15.12ms Harley with one exceptional procedure 15.08ms � Success to reveal 160bit key � about 10 hours on our environment

  4. Timing Attack : Guessing 1bit (genus two) Addition Chain of dD, d=(101............) Input: randomly chosen divisor D DBL ADD D 2D 3D weight 2 5D 4D DBL ADD Addition Chain of dD, d=(101............) with One Exceptional Procedure Input: D = 4 -1 mod (#J c )D 0 , D 0 : weight 1 divisor, #J c : order of Jacobian DBL ADD D 2D 3D fast ! weight 1 5D 4D Ex DBL Ex ADD

  5. Summary � We demonstrated that scalar multiplication of HECC was vulnerable to chosen ciphertext attack � Exceptional procedure using low weight divisors � Easily attacked on regular PC � We should investigate the security of HECC � This attack has not appeared in the standard ECC. � Cryptology ePrint Archive � http://eprint.iacr.org/2003/203 /

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend