Paper
15 July 2022 Research on ECDSA timing attack based on hidden Markov model
Huihui Jia, Yuanyuan Yang, Haohao Song
Author Affiliations +
Proceedings Volume 12258, International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022); 122580Y (2022) https://doi.org/10.1117/12.2639130
Event: International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022), 2022, Qingdao, China
Abstract
Timing attack is a side channel attack method. Elliptic curve cryptography (ECC) is one of the most important publickey cryptography. In this paper, a new timing attack on the Elliptic Curve Digital Signature Algorithm (ECDSA) based on Hidden Markov Model (HMM) was presented. Precisely speaking, the Grover algorithm was used to retrieve the parts of the ephemeral key, and the Koblitz Curve K-409 which was recommended by NIST was attacked successfully. The experiment results showed that the attack could recover almost all the key bits in a few minutes by collecting only once timing dates, and was easy to experiment at a high success rate.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Huihui Jia, Yuanyuan Yang, and Haohao Song "Research on ECDSA timing attack based on hidden Markov model", Proc. SPIE 12258, International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022), 122580Y (15 July 2022); https://doi.org/10.1117/12.2639130
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Binary data

Information security

Analytical research

Cryptanalysis

Cryptography

Algorithms

Computer security

Back to Top