7,629 Hits in 8.4 sec

Power Analysis Attacks of Modular Exponentiation in Smartcards [chapter]

Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan
1999 Lecture Notes in Computer Science  
The first attack requires an adversary to exponentiate many random messages with a known and a secret exponent.  ...  Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described.  ...  Cross-Correlation of Multiplication and Exponentiation Power Signals The above signals were obtained using the power analysis equipment described in Section 4.  ... 
doi:10.1007/3-540-48059-5_14 fatcat:q3dbvdgnqbaivoggzdpmn7tu5i

Horizontal Correlation Analysis on Exponentiation [chapter]

Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
2010 Lecture Notes in Computer Science  
We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip.  ...  Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and Differential Power Analysis (SPA and DPA).  ...  Acknowledgments The authors would like to thank Christophe Giraud and Sean Commercial for their valuable comments and advices on this manuscrit.  ... 
doi:10.1007/978-3-642-17650-0_5 fatcat:imvjhbr6hbgk7htjbrkvrnu4ca

Defeating RSA Multiply-Always and Message Blinding Countermeasures [chapter]

Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini
2011 Lecture Notes in Computer Science  
We analyze the correlation between power measurements of two consecutive modular operations, and use this to eciently recover individual key bits.  ...  We introduce a new correlation power attack on RSA's modular exponentiation implementations, defeating both message blinding and multiply-always countermeasures.  ...  algorithm is not resistant to this type of analysis.  ... 
doi:10.1007/978-3-642-19074-2_6 fatcat:c4wihi7fivhsrbig52bnzisqpy

Randomizing the Montgomery Powering Ladder [chapter]

Duc-Phong Le, Chik How Tan, Michael Tunstall
2015 Lecture Notes in Computer Science  
We also generalize the Montgomery powering ladder and present randomized (both left-to-right and right-to-left) m-ary exponentiation algorithms.  ...  The proposed techniques increase the resistance against side-channel attacks and especially recently published correlation collision attacks in the horizontal setting.  ...  Algorithm 1 describes the most resistant to side-channel analysis version in their paper (as noted by Kim et al. [15] who describe implementations of cross correlation attacks on other versions).  ... 
doi:10.1007/978-3-319-24018-3_11 fatcat:xpgvuhqslreh5noszpywmrq4fa

Vertical and horizontal correlation attacks on RNS-based exponentiations

Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres
2015 Journal of Cryptographic Engineering  
On exponentiations, the so-called horizontal correlation attacks originally proposed by Walter in 2001 and improved by Clavier et al in 2010 demonstrated to be efficient even in the presence of strong  ...  Experiments are conducted on hardware (parallel) and software (sequential) and leakage models for known and masked inputs are constructed for the regular and SPAprotected Montgomery ladder algorithm. ∏  ...  In the context of exponentiation-based public-key algorithms, two categories of attacks have been widely investigated in the recent years: differential power analysis, through different classes of distinguishers  ... 
doi:10.1007/s13389-015-0095-0 fatcat:gaixhnguevbb3o3vhfsexcbe7a

Electromagnetic Analysis: Concrete Results [chapter]

Karine Gandolfi, Christophe Mourtel, Francis Olivier
2001 Lecture Notes in Computer Science  
experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.  ...  Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive  ...  Acknowledgments We are very grateful to David Naccache, Pascal Moitrel, Christophe Clavier and Marc Joye for their contribution and help which greatly improved the development of this study.  ... 
doi:10.1007/3-540-44709-1_21 fatcat:3k3ihoy4onfipnob4bci3lrowu

Improved Collision-Correlation Power Analysis on First Order Protected AES [chapter]

Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
2011 Lecture Notes in Computer Science  
The recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on square-and-multiply always RSA exponentiation at CT-RSA 2011 have shown that collision-correlation power analysis  ...  We propose in this paper improvements on collision-correlation attacks which require less power traces than classical second-order power analysis techniques.  ...  We would also like to thank the anonymous reviewers of this paper for their fruitful comments and advice.  ... 
doi:10.1007/978-3-642-23951-9_4 fatcat:qs7wsdzz5besve4gr5bacezuby

Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware [chapter]

Erich Wenger, Thomas Korak, Mario Kirschbaum
2013 Lecture Notes in Computer Science  
By using different analysis techniques, we are able to recover the secret scalar while using only a single power trace.  ...  One attack correlates two consecutive Montgomery ladder rounds, while another attack directly recovers intermediate operands processed within the digit-serial multiplier.  ...  Promotion Agency (FFG) and the Styrian Business Promotion Agency (SFG) under grant number 836628 (SeCoS).  ... 
doi:10.1007/978-3-642-41332-2_9 fatcat:5cixu7xikjcvxf4nz6jhlr2gse

Introduction to differential power analysis

Paul Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi
2011 Journal of Cryptographic Engineering  
The power consumed by a circuit varies according to the activity of its individual transistors and other components.  ...  This paper examines how information leaked through power consumption and other side channels can be analyzed to extract secret keys from a wide range of devices.  ...  to the development of the DPA Workstation platform and to its analysis and visualization tools that were used in this paper.  ... 
doi:10.1007/s13389-011-0006-y fatcat:xwxqrsf6hfdbti7vplmm745quy

Chosen Base-Point Side-Channel Attack on Montgomery Ladder with x-only coordinate: with Application to secp256k1

Congming Wei, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang
2020 IET Information Security  
Naturally, the attack can be generalised to other Weierstrass curves when they contain special points.  ...  to a chosen basepoint attack.  ...  It is well known that the basic double-and-add algorithm to calculate scalar multiplication is vulnerable to simple power analysis (SPA) [4] , due to the procedure difference of the point addition and  ... 
doi:10.1049/iet-ifs.2018.5228 fatcat:4opjklptgjhh5nugdr6fedvz64

An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays

O.-X. Standaert, E. Peeters, G. Rouvroy, J.-J. Quisquater
2006 Proceedings of the IEEE  
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant attention within the cryptographic community.  ...  For this purpose, we present recent results of attacks attempted against standard encryption algorithms, provide a theoretical estimation of these attacks based on simple statistical parameters and evaluate  ...  Other solutions The previous subsections underlined that obtaining resistance (even in practice) against power analysis attacks is challenging.  ... 
doi:10.1109/jproc.2005.862437 fatcat:6idhtqy76nemrbpeesvd4swheq

Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange

Yessica Saez, Laszlo B. Kish, Enrico Scalas
2013 PLoS ONE  
The types of errors due to statistical inaccuracies in noise voltage measurements are classified and the error probability is calculated.  ...  The results indicate that it is feasible to have so small error probabilities of the exchanged bits that error correction algorithms are not required.  ...  Acknowledgments Related discussions with Elias Gonzalez and Claes-Go ¨ran Granqvist are appreciated.  ... 
doi:10.1371/journal.pone.0081103 pmid:24303033 pmcid:PMC3841199 fatcat:4u5v5rhtkna7pcwgu7zb7r67im

First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography

Damien Jauvart, Jacques J. A. Fournier, Louis Goubin
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
Like most cryptographic algorithms, PBC implementations on embedded devices are exposed to physical attacks such as side channel attacks, which have been shown to recover the secret points used in some  ...  It is, to the best of our knowledge, the first proposed attack against this countermeasure used in the PBC context and this raises questions about the validation of countermeasures for complex cryptographic  ...  ACKNOWLEDGEMENTS This work was supported in part by the EUREKA Catrene programme under contract CAT208 Mobi-Trust and by a French DGA-MRIS scholarship.  ... 
doi:10.5220/0006425501040115 dblp:conf/secrypt/JauvartFG17 fatcat:ijidwxumkrgmzbyafaslllhoaa

A Finite Precision Implementation of an Image Encryption Scheme Based on DNA Encoding and Binarized Chaotic Cores

Rania A. Elmanfaloty, Abdullah M. Alnajim, Ehab Abou-Bakr
2021 IEEE Access  
On the condition that all calculations involved in the scheme are based on binary integer arithmetic, all performed security analysis subjected to the scheme proved that the system could withstand known  ...  DNA encoding adds an extra layer of security to the algorithm by converting both the image and the chaotic stream to DNA sequences using specific DNA encoding rule.  ...  The scheme was subjected to multiple statistical and security analysis, all of which proved its robustness and ability to withstand known attacks.  ... 
doi:10.1109/access.2021.3118050 fatcat:rbddyvwhnjgt5itli6z6i646vi

Online template attacks

Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
2017 Journal of Cryptographic Engineering  
To demonstrate the power of online template attacks, we recover scalar bits of a scalar multiplication using the double-and-add-always algorithm on a twisted Edwards curve running on a smartcard with an  ...  In addition, online template attacks need only one template trace per scalar bit and they can be applied to a broad variety of scalar multiplication algorithms.  ...  Template attacks are a combination of statistical modeling and power analysis attacks consisting of two phases, as follows.  ... 
doi:10.1007/s13389-017-0171-8 fatcat:lbjdumybt5crhl4wpquahi436a
« Previous Showing results 1 — 15 out of 7,629 results