Chosen Base‐point Side‐channel Attack on Montgomery Ladder with X ‐only Coordinate: with Application to Secp256k1

Congming Wei,Jiazhe Chen,An Wang,Beibei Wang,Hongsong Shi,Xiaoyun Wang
DOI: https://doi.org/10.1049/iet-ifs.2018.5228
2020-01-01
IET Information Security
Abstract:This study revisits the side-channel security of the elliptic curve cryptography (ECC) scalar multiplication implemented with Montgomery ladder. Focusing on a specific implementation that does not use they-coordinate for point addition (ECADD) and point doubling (ECDBL), the authors show that Montgomery ladder on Weierstrass curves is vulnerable to a chosen base-point attack. Unlike the normal implementation withy-coordinate, in the scenario of this study, the chosen base-point strategy will not lead to operations with two same inputs during the ECADD and/or ECDBL. Instead, by choosing a suitable base-point, one will find that there are operations that share a common operand; while it is not the case if the base-point is not chosen correctly. This results in the recovery of the secret (fixed) scalar. They also experiment the methods of shared operand detection on a real-world SoC, where asecp256k1dedicated Montgomery ladder scalar multiplication withx-only coordinate is implemented, to show the efficiency of the scalar recovery attack. Naturally, the attack can be generalised to other Weierstrass curves when they contain special points.
What problem does this paper attempt to address?