DPA Attack on the Improved Ha-Moon Algorithm
نویسندگان
چکیده
The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen, Chen, Moon and Ha improved the algorithm by removing these drawbacks [7]. Their new algorithm is inversion-free, has a left-toright approach and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [1, 6]. This paper shows that the improved Ha-Moon algorithm is vulnerable to differential power analysis even if we employ their method in selecting si.
منابع مشابه
An Improved and Efficient Countermeasure against Power Analysis Attacks
Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA attacks are vulnerable to these new DPA attacks which include refined power analysis attacks (RPA), zero-value point attacks (ZPA), and doubling attacks. The new attacks are different from classical D...
متن کاملAn Improved DPA Attack on DES with Forth and Back Random Round Algorithm
The power leakage problems of smart card chip during the process of DES encryption are analyzed, we propose two attack algorithms on DES with forth and back random round algorithm respectively, include the accumulative attack algorithm and segmented attack algorithm. We provided an improved analysis algorithm based on the segmented attack by using a new correctional factor: the cliffy character...
متن کاملGeneric Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
In ICICS’04, Sim et al. proposed an attack against the full version of Ha-Moon’s countermeasure which is one of enhanced countermeasures. The analysis technique is based on the fact that the probability for the appearance of an intermediate value is p = 1/2. By our simulations, however, it is proven to be not true. Thus sometimes the output of their attack might be wrong because there exists th...
متن کاملSecure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
SUMMARY In the execution on a smart card, side channel attacks such as the simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat. Side channel attacks monitor the side channel information such as power consumption and even exploit the leakage information related to power consumption to reveal bits of a secret key d although d is hidden inside a smart c...
متن کاملRandomized Signed-Scalar Multiplication of ECC to Resist Power Attacks
Recently it has been shown that smart cards as cryptographic devices are vulnerable to power attacks if they have no defence against them. Randomization on ECC scalar multiplication is one of the fundamental concepts in methods of defence against side-channel attacks. In this paper by using the randomization concept together with the NAF recoding algorithm, we propose an efficient countermeasur...
متن کامل