DPA Attack on the Improved Ha-Moon Algorithm

نویسندگان

  • Jong Hoon Shin
  • Dong Jin Park
  • Pil Joong Lee
چکیده

The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen, Chen, Moon and Ha improved the algorithm by removing these drawbacks [7]. Their new algorithm is inversion-free, has a left-toright approach and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [1, 6]. This paper shows that the improved Ha-Moon algorithm is vulnerable to differential power analysis even if we employ their method in selecting si.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved and Efficient Countermeasure against Power Analysis Attacks

Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA attacks are vulnerable to these new DPA attacks which include refined power analysis attacks (RPA), zero-value point attacks (ZPA), and doubling attacks. The new attacks are different from classical D...

متن کامل

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm

The power leakage problems of smart card chip during the process of DES encryption are analyzed, we propose two attack algorithms on DES with forth and back random round algorithm respectively, include the accumulative attack algorithm and segmented attack algorithm. We provided an improved analysis algorithm based on the segmented attack by using a new correctional factor: the cliffy character...

متن کامل

Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations

In ICICS’04, Sim et al. proposed an attack against the full version of Ha-Moon’s countermeasure which is one of enhanced countermeasures. The analysis technique is based on the fact that the probability for the appearance of an intermediate value is p = 1/2. By our simulations, however, it is proven to be not true. Thus sometimes the output of their attack might be wrong because there exists th...

متن کامل

Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA

SUMMARY In the execution on a smart card, side channel attacks such as the simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat. Side channel attacks monitor the side channel information such as power consumption and even exploit the leakage information related to power consumption to reveal bits of a secret key d although d is hidden inside a smart c...

متن کامل

Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks

Recently it has been shown that smart cards as cryptographic devices are vulnerable to power attacks if they have no defence against them. Randomization on ECC scalar multiplication is one of the fundamental concepts in methods of defence against side-channel attacks. In this paper by using the randomization concept together with the NAF recoding algorithm, we propose an efficient countermeasur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004