2016 12th International Conference on Computational Intelligence and Security (CIS)
Download PDF

Abstract

Security of embedded devices is a constant challenge due to the development of new and powerful side-channel attack techniques. This paper proposed a new profiling method to attack ECC implementation with combing method, which utilizes the leakage of modular multiplication during adding operations on points. We analyze the decryption of SM2 in a smart IC card with Riscure's platform, and present how to improve the SNR of the power traces during real attack situation. Experiment results show that the maximum success rate of template matching can reach to 100%, which means if an adversary gets the template data he can easily recover the 256-bits private key of SM2 by measurement only one trace, which means key blinding can't defend this attack.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles