To search, Click below search items.


All Published Papers Search Service


Elliptic Curve Kleptography


Elsayed Mohamed, Hassan Elkamchouchi


Vol. 10  No. 6  pp. 183-185


This paper presents an approach to mount secretly embedded trapdoor with universal protection (SETUP) attacks on the elliptic curve discrete logarithm problem. The new approach allows the attacker to obtain the secret key of a cryptographic device covertly. The attack demonstrates the manufacturer’s ability to embed a hidden trapdoor in cryptographic black-box devices used for key exchange. A contaminated device behaves exactly like an honest one while actually leaking the user’s secret key only to the attacker. The attacker can then use that secret key to decrypt all the subsequent communications.


Elliptic Curve Cryptography, Kleptography, Subliminal Channel, SETUP