Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm
نویسندگان
چکیده
The naive implementation of an exponentiation used in public key cryptography may reveal a secret key to the attacker by several side-channel attacks. Recently, a novel square-always exponentiation algorithm based on trading multiplications for squarings is proposed. This algorithm for RSA implementation is faster than existing regular countermeasures against side-channel attacks. This paper suggests that the right-to-left square-always exponentiation algorithm is vulnerable to some sidechannel attacks: collision distance-based doubling, chosen-message SPA, and CPA-based combined attacks. The chosen-message SPA attack can be intactly applied to this algorithm. The other two attacks are variants of the doubling attack and SPA-based combined attack, respectively. In addition, the paper presents an improved right-to-left square-always algorithm resistant to existing and proposed power analysis attacks by using the additive message blinding method and the message update technique before the main iterative operation.
منابع مشابه
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis
The Mist algorithm generates randomly different addition chains for performing a particular exponentiation. This means that power attacks which require averaging over a number of exponentiation power traces becomes impossible. Moreover, attacks which are based on recognising repeated use of the same pre-computed multipliers during an individual exponentiation are also infeasible. The algorithm ...
متن کاملCollision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attacks can be applied to all the standard implementations of the exponentiation process: bin...
متن کاملTwo Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms, a multiply-always implementation is generally used. Witteman et al. introduced in [14] a new cross-correlation power analysis attack against the multiplyalways implementation. We suggest two new algorithms, resistant to this attack and also to other known attacks. The first algorithm is an alte...
متن کاملComparative Investigation of Methods of Modular Exponentiation
Main parameters of evaluation of modern information protection systems that implement RSA encryption algorithm are performance, RAM consumption and stability of algorithm of used method of modular exponentiation to the attacks on implementation, particularly in the temporal analysis. Methods of modular exponentiation (binary method, method and sliding window method) are characterized by the dep...
متن کاملDPA Attack on the Improved Ha-Moon Algorithm
The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen, Chen, Moon and Ha improved the algorithm by removing these drawbacks [7]. Their new algorithm is inversion-free, has a left-toright approach and employs a window method. They insisted that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 4 شماره
صفحات -
تاریخ انتشار 2014