Abstract
Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster. © IFIP International Federation for Information Processing 2005.
Author supplied keywords
Cite
CITATION STYLE
Han, D. G., Takagi, T., Kim, T. H., Kim, H. W., & Chung, K. I. (2005). Collision attack on XTR and a countermeasure with a fixed pattern. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 864–873). Springer Verlag. https://doi.org/10.1007/11596042_89
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.