Two operands of multipliers in side-channel attack

6Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multipliers. There are two consequences. Firstly, designing order of operands can be a cost-effective countermeasure.We show a concrete example in which operand order determines success and failure of the attack. Secondly, countermeasures can be ineffective if the asymmetric leakage is considered. In addition to the main results, the attack by Hanley et al. is extended using the signal-processing technique of the big mac attack. An experimental result to successfully analyze an FPGA implementation of RSA with the multiply-always method is also presented.

Cite

CITATION STYLE

APA

Sugawara, T., Suzuki, D., & Saeki, M. (2015). Two operands of multipliers in side-channel attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9064, pp. 64–78). Springer Verlag. https://doi.org/10.1007/978-3-319-21476-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free