Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure

被引:0
|
作者
Hui Wang
Wei Guo
Jizeng Wei
机构
[1] Tianjin University,Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology
来源
World Wide Web | 2018年 / 21卷
关键词
Side channel attack; Correlation power analysis (CPA); Chosen-message method; Modular exponentiation;
D O I
暂无
中图分类号
学科分类号
摘要
The chosen-message method is used to be employed in conducting Simple Power Analysis (SPA) attack by means of selecting special input messages. However, it is difficult to make distinction by visual observation i.e., SPA in practical IoT hardware environment. In this paper, we proposed a practical chosen-message correlation power analysis (CPA) attack which combines the chosen-message method with CPA for side channel attack. Then, we adopt other two practical chosen-messages, 1 and n + 1, to attack Boscher’s right-to-left binary exponentiation algorithm which is wildly considered as an efficient side channel resistant algorithm. Finally, this paper presents a countermeasure to resist the chosen-message CPA attack over Boscher’s algorithm without nullifying its countermeasure features to Differential Power Analysis (DPA) and Differential Fault Analysis (DFA). To validate the proposed attack method and countermeasure, a 1024-bit RSA coprocessor is constructed on the Xilinx Virtex-5 with the Side-channel Attack Standard Evaluation Board (SASEBO) to implement Boscher’s algorithm as well as our proposed algorithm and launched the proposed attack on it separately. The experiment results show that the proposed attack and countermeasure are feasible and efficient.
引用
收藏
页码:201 / 217
页数:16
相关论文
共 6 条
  • [1] Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
    Wang, Hui
    Guo, Wei
    Wei, Jizeng
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 201 - 217
  • [2] Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm
    Chen Aidong
    Xu Sen
    Chen Yun
    Qin Zhiguang
    CHINA COMMUNICATIONS, 2013, 10 (05) : 114 - 119
  • [3] Collision-based power analysis of modular exponentiation using chosen-message Pairs
    Homma, Naofumi
    Miyamoto, Atsushi
    Aoki, Takafumi
    Satoh, Akashi
    Shamir, Adi
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 15 - +
  • [4] An Optimized Cross Correlation Power Attack of Message Blinding Exponentiation Algorithms
    WAN Wunan
    YANG Wei
    CHEN Jun
    中国通信, 2015, 12 (06) : 22 - 32
  • [5] An Optimized Cross Correlation Power Attack of Message Blinding Exponentiation Algorithms
    Wan Wunan
    Yang Wei
    Chen Jun
    CHINA COMMUNICATIONS, 2015, 12 (06) : 22 - 32
  • [6] Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient Countermeasure
    Su, Liangjian
    Guo, Wei
    Guo, Zheng
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 331 - 334