SEDLÁČEK, Vladimír, Jesús-Javier CHI-DOMINGUEZ, Ján JANČÁR and Billy Bob BRUMLEY. A formula for disaster: a unified approach to elliptic curve special-point-based attacks. Online. In Tibouchi M., Wang H. Advances in Cryptology – ASIACRYPT 2021. Cham: Springer, 2021, p. 130-159. ISBN 978-3-030-92061-6. Available from: https://dx.doi.org/10.1007/978-3-030-92062-3_5.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name A formula for disaster: a unified approach to elliptic curve special-point-based attacks
Authors SEDLÁČEK, Vladimír (203 Czech Republic, guarantor, belonging to the institution), Jesús-Javier CHI-DOMINGUEZ, Ján JANČÁR (703 Slovakia, belonging to the institution) and Billy Bob BRUMLEY.
Edition Cham, Advances in Cryptology – ASIACRYPT 2021, p. 130-159, 30 pp. 2021.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10200 1.2 Computer and information sciences
Country of publisher Switzerland
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW Publisher website Website
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/21:00119154
Organization unit Faculty of Informatics
ISBN 978-3-030-92061-6
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-030-92062-3_5
UT WoS 000926634200005
Keywords in English elliptic curve cryptography; ECDH; side-channel analysis; RPA; ZVP; EPA; exceptional points
Tags best3, core_A, firank_A
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 16/8/2023 13:22.
Abstract
The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-channel attack techniques against specific cases of elliptic curve cryptography. The three attacks recover bits of a static ECDH key adaptively, collecting information on whether a certain multiple of the input point was computed. We unify and generalize these attacks in a common framework and solve the corresponding problem for a broader class of inputs. We also introduce a version of the attack against windowed scalar multiplication methods, recovering the full scalar instead of just a part of it. Finally, we systematically analyze elliptic curve point addition formulas from the Explicit-Formulas Database, classify all non-trivial exceptional points, and find them in new formulas. These results indicate the usefulness of our tooling for unrolling formulas and finding special points, which might be of independent research interest.
Links
GA20-03426S, research and development projectName: Ověření a zlepšení bezpečnosti kryptografie eliptických křivek
Investor: Czech Science Foundation
MUNI/A/1549/2020, interní kód MUName: Zapojení studentů Fakulty informatiky do mezinárodní vědecké komunity 21 (Acronym: SKOMU)
Investor: Masaryk University
PrintDisplayed: 26/4/2024 04:51