To infinity and beyond: combined attack on ECC using points of low order

  • Authors:
  • Junfeng Fan;Benedikt Gierlichs;Frederik Vercauteren

  • Affiliations:
  • Katholieke Universiteit Leuven, COSIC & IBBT, Kasteelpark Arenberg, Leuven-Heverlee, Belgium;Katholieke Universiteit Leuven, COSIC & IBBT, Kasteelpark Arenberg, Leuven-Heverlee, Belgium;Katholieke Universiteit Leuven, COSIC & IBBT, Kasteelpark Arenberg, Leuven-Heverlee, Belgium

  • Venue:
  • CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low order. Using side channel information we deduce when the point at infinity occurs during the scalar multiplication, which leaks information about the secret key. In the best case, our attack breaks a simple and differential side channel analysis resistant implementation with input/output point validity and curve parameter checks using a single query.