Implementation of power attack analysis in ML algorithm circuit with elliptic curve cryptosystems

Han Yu,Zou Xuecheng,Liu Zhenglin,Dan Yongping
2009-01-01
Abstract:Power leakages of the Montgomery Ladder(ML) algorithm circuit implementation for elliptic curve cryptosystems over GF(2163) were studied. A simple and effective differential power analysis(DPA) attack was considered. Single-exponent multiple-data(SEMD) was referred.The attack differentiates power traces to multiple subsections according to each key bit.Based on United Microelectronics Corporation(UMC) 0.25 μm,1.8 V technology library,a simulation-based circuit implementation and experimental platform were built to evaluate the effectiveness of the new attack.Experimental results show that the secret key could be retrieved rapidly using only one power sample.It is concluded that Montgomery Ladder implementation is immune to timing analysis and simple power analysis(SPA) attacks,but still vulnerable to DPA attacks.
What problem does this paper attempt to address?