175 Hits in 4.9 sec

The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks [chapter]

Katsuyuki Okeya, Tsuyoshi Takagi
2003 Lecture Notes in Computer Science  
The side channel attack (SCA) is a serious attack on wearable devices that have scarce computational resources.  ...  In this paper we present efficient SCA-resistant scalar multiplications based on window method.  ...  Second-Order DPA: Okeya and Sakurai [OS02c] have proposed a second-order DPA attack against Möller's window method [Möl01a] .  ... 
doi:10.1007/3-540-36563-x_23 fatcat:mu3kvhg7mzcq5bh3chwm67wahu

Defeating Simple Power Analysis on Koblitz Curves

2006 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis.  ...  However, such devices are often vulnerable to side channel attacks.  ...  In this paper, we analyze a novel countermeasure against side channel attacks on Koblitz curves. First, we propose a zerofree recoding method for τ expansions.  ... 
doi:10.1093/ietfec/e89-a.5.1362 fatcat:iigji4eecvbunhgoszzd4tft74

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

Tae Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jong In Lim
2007 ETRI Journal  
Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed.  ...  First, we propose several ways the improved countermeasures based on BSD representations can be attacked.  ...  In order to show the practicality of the proposed attack, we have examined the number of samples needed in the DPA attack since this affects the success of statistical power attacks.  ... 
doi:10.4218/etrij.07.0106.0220 fatcat:eiing2itc5fmxhez5ool4jdqta

You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation [chapter]

J. Pan, J. I. den Hartog, Jiqiang Lu
2009 Lecture Notes in Computer Science  
Three generic S-box implementation methods have been proposed by Prouff el al., together with formal proofs of their security against 1st or 2nd-order side-channel analysis.  ...  These methods use a similar combination of masking and hiding countermeasures.  ...  As general conclusions, we find that this work leads to several general observations for countermeasures against side-channel analysis.  ... 
doi:10.1007/978-3-642-10838-9_14 fatcat:euuzusphkjhsbg3nihfui6cfy4

An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost [chapter]

Junfeng Fan, Ingrid Verbauwhede
2012 Lecture Notes in Computer Science  
For implementers of elliptic curve cryptography, this paper can be used as a road map for countermeasure selection in the early design stages.  ...  While the adversary only needs to succeed in one out of many attack methods, the designers have to consider all the known attacks, whenever applicable to their system, simultaneously.  ...  This method is an effective countermeasures against Goubin's RPA if the exploited special points are of small order.  ... 
doi:10.1007/978-3-642-28368-0_18 fatcat:mpb6ayiq2ngxlngpmdjdss4o5a

Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations [chapter]

Tae Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
2006 Lecture Notes in Computer Science  
Furthermore, we enhance the proposed attack in two ways such that it works against right-to-left algorithm in a simpler and more efficient way, and also works against one combined with an extra DPA countermeasure  ...  In ICICS'04, Sim et al. proposed an attack against the full version of Ha-Moon's countermeasure which is one of enhanced countermeasures.  ...  Thus, in this paper, we do not deal with countermeasures based on window methods using randomized addition chains.  ... 
doi:10.1007/11733447_9 fatcat:76cv6nxuvjbsdinptwjr7yvkg4

A Video Complexity Index for Cluster Computing

Demstenes Z. Rodrguez, et al.
2014 International Journal of Computing and Digital Systems  
The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has been the focus of many side channel analysis (SCA) attacks in recent years.  ...  By randomizing the radix of encoding for Booth multiplication and randomizing the window size for exponentiation, we demonstrate a SCA countermeasure can be constructed which increases RSA SCA attack protection  ...  Differential and Correlation Power Analysis Differential power analysis (DPA), presented by Kocher [1] , is a very common and very powerful side channel attack.  ... 
doi:10.12785/ijcds/030104 fatcat:o7zbqyhkf5hhlfs4fdduoaz4sm

A new remote keyless entry system resistant to power analysis attacks

Amir Moradi, Timo Kasper
2009 2009 7th International Conference on Information, Communications and Signal Processing (ICICS)  
In this paper, we introduce a new RKE system that is inherently resistant against side-channel attacks, independent of the implementation platform.  ...  In CRYPTO 2008, it has been shown that poweranalysis attacks can completely break real-word remote keyless entry (RKE) systems based on the KEELOQ code-hopping scheme.  ...  In addition to the conventional DPA-resistance techniques which are applied at the implementation level, the PRNG has been designed to be secure against side-channel attack independently of the method  ... 
doi:10.1109/icics.2009.5397727 fatcat:kw56ud354bdqtcecjqderk4sqm

A More Flexible Countermeasure against Side Channel Attacks Using Window Method [chapter]

Katsuyuki Okeya, Tsuyoshi Takagi
2003 Lecture Notes in Computer Science  
However, side channel attacks (SCA) can break the secret key of ECC on such devices, if the implementation method is not carefully considered.  ...  The previous SPA-countermeasures based on window methods utilize the fixed pattern windows, so that they only take discrete table size.  ...  Side Channel Attacks and Their Countermeasures In this section we review side channel attacks and their countermeasures.  ... 
doi:10.1007/978-3-540-45238-6_31 fatcat:ilyaqlw5evfedor5to7pxg7pka

An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms

Fan Zhang, Zhijie Jerry Shi
2008 Fifth International Conference on Information Technology: New Generations (itng 2008)  
In this paper, we propose an efficient window-based countermeasure that is secure against existing power analysis attacks.  ...  Compared to previous countermeasures, our method has low memory overhead, requiring only a table of w+1 entries when the window size is w bits.  ...  In our window based countermeasure, however, an error is always propagated to the output. So our countermeasure is secure against computational safe error attack.  ... 
doi:10.1109/itng.2008.183 dblp:conf/itng/ZhangS08 fatcat:vnsf4a5qhjfzlg5kskbbhfsqrq

Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [chapter]

Jerry den Hartog, Erik de Vink
2005 IFIP International Federation for Information Processing  
The tool can simulate side-channel leakage and has a suite of utilities to analyze this.  ...  The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities.  ...  However, it clearly shows the advantage of software-based feedback for side-channel attacks on smartcards.  ... 
doi:10.1007/0-387-24098-5_7 fatcat:l3fcet2mdnaszluoeajxpflulu

On XTR and Side-Channel Analysis [chapter]

Daniel Page, Martijn Stam
2004 Lecture Notes in Computer Science  
We present the first known SPA attack against XTR double exponentiation and two defence methods against such an attack. We also investigate methods of defending XTR against DPA attack.  ...  Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods.  ...  This offers a very low performance overhead defence method while achieving a high level of security against side-channel attack.  ... 
doi:10.1007/978-3-540-30564-4_4 fatcat:vrowulchzndebarhfokl7f37le

The EM Side—Channel(s) [chapter]

Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
2003 Lecture Notes in Computer Science  
We show that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even be used to break power analysis countermeasures.  ...  We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices.  ...  This paper has greatly benefitted from the advice of anonymous CHES referees whose comments helped in selecting aspects of our work on the EM side-channel to create a more focussed paper.  ... 
doi:10.1007/3-540-36400-5_4 fatcat:bmcaydjn3bgxlh7f33gscbx6xy

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario [chapter]

Thomas Korak, Thomas Plos, Michael Hutter
2012 Lecture Notes in Computer Science  
Target of the attacks is an implementation of the Advanced Encryption Standard (AES) with 128-bit key length and DPA countermeasures.  ...  In this work we present differential power analysis (DPA) and differential electromagnetic analysis (DEMA) attacks on a securityenabled RFID tag.  ...  Side-Channel Analysis Results In order to evaluate the security of the NFC tag we performed DPA and DEMA attacks on the AES implementation on the chip.  ... 
doi:10.1007/978-3-642-29912-4_2 fatcat:rok5f4xr7ra6ravbmzhjzqjwaq

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks [chapter]

Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger
2008 Lecture Notes in Computer Science  
Furthermore, we aimed to secure the SSL handshake against side-channel attacks (in particular simple power analysis) by eliminating all data-dependent or key-dependent branches and memory accesses from  ...  Our lightweight SSL stack has only 6% of the code size and RAM requirements of OpenSSL, but outperforms it in point multiplication over prime fields when no appropriate countermeasures against side-channel  ...  countermeasures against timing analysis and DPA attacks need to be effective.  ... 
doi:10.1007/978-3-540-89641-8_25 fatcat:bdzahwo3w5gdhjnpb4rz72za7i
« Previous Showing results 1 — 15 out of 175 results