In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Yen, S. M., Lien, W. C., Moon, S. J., & Ha, J. C. (2005). Power analysis by exploiting chosen message and internal collisions -vulnerability of checking mechanism for RSA-decryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3715 LNCS, pp. 183–195). Springer Verlag. https://doi.org/10.1007/11554868_13
Mendeley helps you to discover research relevant for your work.