Chosen-message Power Analysis Attack Based on the Hamming Weight Model

نویسندگان

  • CHEN Ai-dong
  • Wang
  • Juan
  • XU Sen
چکیده

The chosen-message in the power analysis attack is easy to be forbidden. For circumvent this problem, a new method is proposed, which is based on the analysis of the Montgomery Modular Multiplication algorithm. In this method, a large number which has very small Hamming weight is chosen as the plaintext and the information of the secret key is directed shown in the power curve. In the experiment on the 8051 chip, the recovery rate of the secret key is up to 99% from a single power sample and the efficiency of the attack is much higher than DPA and CPA. The results of the experiments show that there are many plaintexts which can be chosen in our method and the single method based on the chosen-message forbidden can’t defense this new attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm

The RSA-CRT algorithm has been widely used for the efficiency of its exponent operation. Research has been announced about the physical susceptibility of RSA-CRT from various side channel attacks. Among them, Boer et al. proposed a brilliant differential power analysis (DPA) of CRT reduction with equidistant chosen messages that is called MRED (Modular reduction on Equidistant Data). This attac...

متن کامل

Linear Regression Side Channel Attack Applied on Constant XOR

Linear regression side channel attack (LRA) used to be known as a robust attacking method as it makes use of independent bits leakage. This leakage assumption is more general than Hamming weight/ Hamming distance model used in correlation power attack (CPA). However, in practice, Hamming weight and Hamming distance model suit most devices well. In this paper, we restudy linear regression attack...

متن کامل

An overview of side-channel attacks on the asymmetric NESSIE encryption primitives

Most serious asymmetric cryptosystems proposed in the last couple of years have been provided with a proof of security (which may or may not use the random oracle model or the generic group model) and no serious attacks have been found against these algorithms in the mathematical setting. This has led to an increase in the use of side-channel attacks. A side-channel is a method with which an at...

متن کامل

Improved Side Channel Cube Attacks on PRESENT

The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], based on the same model of single bit leakage in the 3 round, we show that: if the PRESENT cipher structure is unknown, for the leakage bit 0, 32-bit key can be recovered within 2 chosen plaintexts; if the cipher structure ...

متن کامل

Side-Channel Analysis: Combining (Quantitative) Statistical Analysis with Engineer’s (Qualitative) Intuition

In the last decade side-channel cryptanalysis (timing attacks, power attacks, electromagnetic radiation attacks, cache-based attacks etc.) has become an important branch in cryptology. The goal of any side-channel attack is to extract key-dependent information from the leakage signal. For simplicity, we focus on power attacks in the following although our considerations could be adapted to radi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012