Timing Attacks on Elliptic Curve Cryptosystems (ECC)

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Lecture 8: Lattices and Elliptic Curves
Advanced Information Security 2 SCALAR MULTIPLICATION Dr. Turki F. Al-Somani 2015.
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
1 Efficient Algorithms for Elliptic Curve Cryptosystems Original article by Jorge Guajardo and Christof Paar Of WPI ECE Department Presentation by Curtis.
Elliptic Curve Cryptography Shane Almeida Saqib Awan Dan Palacio.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Electronic Payment Systems Lecture 5: ePayment Security II
RSA Exponentiation cipher
An Expandable Montgomery Modular Multiplication Processor Adnan Abdul-Aziz GutubAlaaeldin A. M. Amin Computer Engineering Department King Fahd University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Chapter 3 Encryption Algorithms & Systems (Part C)
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Public Key Model 8. Cryptography part 2.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
Application of Elliptic Curves to Cryptography
GSM CLONING. GSM (Global System for Mobile Communication) Most widely used cellular mobile phone system. First digital system to follow analog era. Specification.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Elliptic Curve Cryptography
Elliptic Curve Crypto & ECC Diffie-Hellman Presenter: Le Thanh Binh.
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
1 Network Security Dr. Syed Ismail Shah
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Asymmetric-Key Cryptography
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 7 – The RSA Cryptosystem.
Attacks on Public Key Encryption Algorithms
Chapter 9 – Elliptic Curve Cryptography ver. November 3rd, 2009
Public Key Cryptosystem
Montgomery Modular Multiplication
Asymmetric-Key Cryptography
Advanced Information Security 5 ECC Cryptography
Network Security Unit-III
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
Group theory exercise.
Public Key Cryptosystems - RSA
Knapsack Cryptosystems
Efficient CRT-Based RSA Cryptosystems
Cryptography: Basics (2)
The Application of Elliptic Curves Cryptography in Embedded Systems
Bishop: Chapter 10 Key Management: Digital Signature
El Gamal and Diffie Hellman
El Gamal and Diffie Hellman
Introduction to Elliptic Curve Cryptography
Discrete Log ElGamal Cryptosystem
Chapter 13 Digital Signature
Symmetric-Key Cryptography
Oblivious Transfer.
Computer Security Elliptic Curve Cryptosystems
Secure Diffie-Hellman Algorithm
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
How to Use Charm Crypto Lib
Presentation transcript:

Timing Attacks on Elliptic Curve Cryptosystems (ECC) Zhijian Lu Matthew Mah Michael Neve Eric Peeters

Timing Attacks Side Channel Attack Use known texts to measure timings Time Input Output Protocol, smartcard Side Channel Attack Use known texts to measure timings Use statistical methods to guess key from timings

How to Guess a Key Bit 1:00 1:00 1:00 2:00

Timing Attack on RSA Montgomery Algorithm to perform (md): x = m for i = n – 2 downto 0 x = x2 if (dj == 1) then x = x * m // modular reduction? end return x m? or

ECC

ECC Public Key Cryptosystem Y=y P Security: Private Key Security: Difficult to solve for y by calculating P, 2P, ...,yP =Y But there is efficient algorithm for computing kP

Timing Attack On ECC Montgomery Algorithm for ECC Output: kP Q = 0 for i from t –1 downto 0 do Q = 2Q if ki == 1 then Q = Q + P Return Q ?

Steps Examined P + Q = R s = (yP + yQ) / (xP + xQ) xR = s2 + s + xP + xQ + a (parameter of curve) yR = s(xP + xR) + xR + yP ? 1/(xP + xQ) s2

Timing Attack On ECC Montgomery Algorithm for ECC Output: kP Q = 0 for i from t –1 downto 0 do Q = 2Q if ki == 1 then Q = Q + P Return Q For implementation we found ?

Timing Attack on ECC (cont) A vulnerable implementation if ki == 1 then if sleep(1000) else sleep (100) Q = Q + P

Conclusions Timing attacks depend on implementation Timing attacks possible on many systems (RSA, ECC, etc.) Never let your advisor choose your topic for you...

El Gamal Known: Elliptic Curve, P (Base Point), Y (public key) Alice m, k a=kP G=kY b=m+G c=(a,b) Bob G'=ya m'=b-G'=m proof m'=b-G'=b-ya=b-ykP=b-kY=m+G-kY=m+kY-kY=m