TY - GEN
T1 - Collision-based power analysis of modular exponentiation using chosen-message pairs
AU - Homma, Naofumi
AU - Miyamoto, Atsushi
AU - Aoki, Takafumi
AU - Satoh, Akashi
AU - Shamir, Adi
PY - 2008
Y1 - 2008
N2 - This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attacks can be applied to all the standard implementations of the exponentiation process: binary (left-to-right and right-to-left), m-ary, and sliding window methods. The SPA countermeasure of inserting dummy multiplications can also be defeated (in some cases) by using the proposed attacks. The effectiveness of the attacks is demonstrated by actual experiments with hardware and software implementations of RSA on an FPGA and the PowerPC processor, respectively. In addition to the new collision generation methods, a high-accuracy waveform matching technique is introduced to detect the collisions even when the recorded signals are noisy and the clock has some jitter.
AB - This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attacks can be applied to all the standard implementations of the exponentiation process: binary (left-to-right and right-to-left), m-ary, and sliding window methods. The SPA countermeasure of inserting dummy multiplications can also be defeated (in some cases) by using the proposed attacks. The effectiveness of the attacks is demonstrated by actual experiments with hardware and software implementations of RSA on an FPGA and the PowerPC processor, respectively. In addition to the new collision generation methods, a high-accuracy waveform matching technique is introduced to detect the collisions even when the recorded signals are noisy and the clock has some jitter.
KW - Modular exponentiation
KW - Power-analysis attacks
KW - RSA
KW - Side-channel attacks
KW - Waveform matching
UR - http://www.scopus.com/inward/record.url?scp=51049124307&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51049124307&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-85053-3_2
DO - 10.1007/978-3-540-85053-3_2
M3 - Conference contribution
AN - SCOPUS:51049124307
SN - 354085052X
SN - 9783540850526
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 15
EP - 29
BT - Cryptographic Hardware and Embedded Systems - CHES 2008 - 10th International Workshop, Proceedings
T2 - 10th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008
Y2 - 10 August 2008 through 13 August 2008
ER -