Collision-based power analysis of modular exponentiation using chosen-message pairs

47Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attacks can be applied to all the standard implementations of the exponentiation process: binary (left-to-right and right-to-left), m-ary, and sliding window methods. The SPA countermeasure of inserting dummy multiplications can also be defeated (in some cases) by using the proposed attacks. The effectiveness of the attacks is demonstrated by actual experiments with hardware and software implementations of RSA on an FPGA and the PowerPC processor, respectively. In addition to the new collision generation methods, a high-accuracy waveform matching technique is introduced to detect the collisions even when the recorded signals are noisy and the clock has some jitter. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Homma, N., Miyamoto, A., Aoki, T., Satoh, A., & Shamir, A. (2008). Collision-based power analysis of modular exponentiation using chosen-message pairs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5154 LNCS, pp. 15–29). https://doi.org/10.1007/978-3-540-85053-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free