Comparative Power Analysis of Modular Exponentiation Algorithms

被引:28
作者
Homma, Naofumi [1 ]
Miyamoto, Atsushi [1 ]
Aoki, Takafumi [1 ]
Satoh, Akashi [2 ]
Shamir, Adi [3 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1010021, Japan
[3] Weizmann Inst Sci, IL-76100 Rehovot, Israel
关键词
Side-channel attacks; power-analysis attacks; RSA; modular exponentiation; waveform matching; IMAGE REGISTRATION;
D O I
10.1109/TC.2009.176
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes new chosen-message power-analysis attacks for public-key cryptosystems based on modular exponentiation, where specific input pairs are used to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attack can be applied to all standard implementations of the exponentiation process, namely binary (left-to-right and right-to-left), m-ary, and sliding window methods. The proposed attack can also circumvent typical countermeasures, such as the Montgomery powering ladder and the double-add algorithm. The effectiveness of the attack is demonstrated in experiments with hardware and software implementations of RSA on an FPGA and a PowerPC processor, respectively. In addition to the new collision generation methods, a highly accurate waveform matching technique is introduced for detecting the collisions even when the recorded signals are noisy and there is a certain amount of clock jitter.
引用
收藏
页码:795 / 807
页数:13
相关论文
共 26 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 1996, CRYPTO, DOI DOI 10.1007/3-540-68697-5_9
[3]  
BOER B, 2002, P CHES 2002, P228
[4]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4876, P84
[5]  
CHEN QS, 1994, IEEE T PATTERN ANAL, V16, P1156
[6]  
Fouque PA, 2003, LECT NOTES COMPUT SC, V2779, P269, DOI 10.1007/978-3-540-45238-6_22
[7]  
Homma N, 2008, LECT NOTES COMPUT SC, V5154, P15, DOI 10.1007/978-3-540-85053-3_2
[8]  
Homma N, 2006, LECT NOTES COMPUT SC, V4249, P187
[9]  
ITOH K, 2002, P INT WORKSH CRYPT H, P303
[10]  
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291