Collision attack on XTR and a countermeasure with a fixed pattern

Dong Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster.

Original languageEnglish
Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
Pages864-873
Number of pages10
Publication statusPublished - Dec 1 2005
EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
Duration: Dec 6 2005Dec 9 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3823 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
CountryJapan
CityNagasaki
Period12/6/0512/9/05

Fingerprint

Collision Attack
Exponentiation
Countermeasures
Side Channel Attacks
Complexity Analysis
Cryptosystem
Energy Efficient
Cryptography
Side channel attack

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Han, D. G., Takagi, T., Kim, T. H., Kim, H. W., & Chung, K. I. (2005). Collision attack on XTR and a countermeasure with a fixed pattern. In Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings (pp. 864-873). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS).

Collision attack on XTR and a countermeasure with a fixed pattern. / Han, Dong Guk; Takagi, Tsuyoshi; Kim, Tae Hyun; Kim, Ho Won; Chung, Kyo Il.

Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. p. 864-873 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Han, DG, Takagi, T, Kim, TH, Kim, HW & Chung, KI 2005, Collision attack on XTR and a countermeasure with a fixed pattern. in Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3823 LNCS, pp. 864-873, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, 12/6/05.
Han DG, Takagi T, Kim TH, Kim HW, Chung KI. Collision attack on XTR and a countermeasure with a fixed pattern. In Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. p. 864-873. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Han, Dong Guk ; Takagi, Tsuyoshi ; Kim, Tae Hyun ; Kim, Ho Won ; Chung, Kyo Il. / Collision attack on XTR and a countermeasure with a fixed pattern. Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. 2005. pp. 864-873 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{cb13054af7bd4ec987e70333962066fc,
title = "Collision attack on XTR and a countermeasure with a fixed pattern",
abstract = "Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55{\%} improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30{\%} faster.",
author = "Han, {Dong Guk} and Tsuyoshi Takagi and Kim, {Tae Hyun} and Kim, {Ho Won} and Chung, {Kyo Il}",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "3540308032",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "864--873",
booktitle = "Embedded and Ubiquitous Computing - EUC 2005 Workshops",

}

TY - GEN

T1 - Collision attack on XTR and a countermeasure with a fixed pattern

AU - Han, Dong Guk

AU - Takagi, Tsuyoshi

AU - Kim, Tae Hyun

AU - Kim, Ho Won

AU - Chung, Kyo Il

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster.

AB - Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 240 where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster.

UR - http://www.scopus.com/inward/record.url?scp=33744910862&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744910862&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33744910862

SN - 3540308032

SN - 9783540308034

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 864

EP - 873

BT - Embedded and Ubiquitous Computing - EUC 2005 Workshops

ER -