Invalid-curve Attack
ECDHにおいてpP == qPとなるPがlarge orderなE上ではなくorder5なE'上の点(clientがserverに強制)とすると、serverのprivate keyを5 iterで算出できる。
blog post: Invalid curve attacks, explained
slide: Practical Invalid Curve Attacks on TLS-ECDH
Invalid curve attack: finding low order points
You could have invented that Bluetooth attack
Cryptographic Right Answers: almost certainly don’t want to be using it in the first place
Our attack exploits improper validation of ECDH public keys by introducing the Fixed Coordinate Invalid Curve Attack. It is a MitM attack that modifies the public keys in a way that lets the attacker deduce the shared secret.