Chosen-message Power Analysis Attack Based on the Hamming Weight Model
نویسندگان
چکیده
The chosen-message in the power analysis attack is easy to be forbidden. For circumvent this problem, a new method is proposed, which is based on the analysis of the Montgomery Modular Multiplication algorithm. In this method, a large number which has very small Hamming weight is chosen as the plaintext and the information of the secret key is directed shown in the power curve. In the experiment on the 8051 chip, the recovery rate of the secret key is up to 99% from a single power sample and the efficiency of the attack is much higher than DPA and CPA. The results of the experiments show that there are many plaintexts which can be chosen in our method and the single method based on the chosen-message forbidden can’t defense this new attack.
منابع مشابه
An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm
The RSA-CRT algorithm has been widely used for the efficiency of its exponent operation. Research has been announced about the physical susceptibility of RSA-CRT from various side channel attacks. Among them, Boer et al. proposed a brilliant differential power analysis (DPA) of CRT reduction with equidistant chosen messages that is called MRED (Modular reduction on Equidistant Data). This attac...
متن کاملLinear Regression Side Channel Attack Applied on Constant XOR
Linear regression side channel attack (LRA) used to be known as a robust attacking method as it makes use of independent bits leakage. This leakage assumption is more general than Hamming weight/ Hamming distance model used in correlation power attack (CPA). However, in practice, Hamming weight and Hamming distance model suit most devices well. In this paper, we restudy linear regression attack...
متن کاملAn overview of side-channel attacks on the asymmetric NESSIE encryption primitives
Most serious asymmetric cryptosystems proposed in the last couple of years have been provided with a proof of security (which may or may not use the random oracle model or the generic group model) and no serious attacks have been found against these algorithms in the mathematical setting. This has led to an increase in the use of side-channel attacks. A side-channel is a method with which an at...
متن کاملImproved Side Channel Cube Attacks on PRESENT
The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], based on the same model of single bit leakage in the 3 round, we show that: if the PRESENT cipher structure is unknown, for the leakage bit 0, 32-bit key can be recovered within 2 chosen plaintexts; if the cipher structure ...
متن کاملSide-Channel Analysis: Combining (Quantitative) Statistical Analysis with Engineer’s (Qualitative) Intuition
In the last decade side-channel cryptanalysis (timing attacks, power attacks, electromagnetic radiation attacks, cache-based attacks etc.) has become an important branch in cryptology. The goal of any side-channel attack is to extract key-dependent information from the leakage signal. For simplicity, we focus on power attacks in the following although our considerations could be adapted to radi...
متن کامل