Improved side-channel analysis of finite-field multiplication

28Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A side-channel analysis of multiplication in GF(2128) has recently been published by Belaïd, Fouque and Gérard at Asiacrypt 2014, with an application to AES-GCM. Using the least significant bit of the Hamming weight of the multiplication result, the authors have shown how to recover the secret multiplier efficiently. However such least significant bit is very sensitive to noise measurement; this implies that, without averaging, their attack can only work for high signal-to-noise ratios (SNR > 128). In this paper we describe a new side-channel attack against the multiplication in GF(2128) that uses the most significant bits of the Hamming weight. We show that much higher values of noise can be then tolerated. For instance with an SNR equal to 8, the key can be recovered using 220 consumption traces with time and memory complexities respectively equal to 251.68 and 236. We moreover show that the new method can be extended to attack the fresh re-keying countermeasure proposed by Medwed, Standaert, Grosschädl and Regazzoni at Africacrypt 2010.

Cite

CITATION STYLE

APA

Belaïd, S., Coron, J. S., Fouque, P. A., Gérard, B., Kammerer, J. G., & Prouff, E. (2015). Improved side-channel analysis of finite-field multiplication. In Lecture Notes in Computer Science (Vol. 9293, pp. 395–415). Springer Verlag. https://doi.org/10.1007/978-3-662-48324-4_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free