Modified power-analysis attacks on XTR and an efficient countermeasure

Dong Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai

研究成果: ジャーナルへの寄稿記事

2 引用 (Scopus)

抄録

In [HLS04a], Han et al. presented a nice overview of some side channel attacks (SCA), and some classical countermeasures. However, their proposed countermeasures against SCA are so inefficient that the efficiency of XTR with SCA countermeasures is at least 129 times slower than that of XTR without them. Thus they remained the construction of the efficient countermeasures against SCA as an open question. In this paper, we show that XTR can be also attacked by the modified refined power analysis (MRPA) and the modified zero-value attack (MZVA). To show validity of MRPA and MZVA on XTR, we give some numerical data of them. We propose a novel efficient countermeasure (XTR-RSE) against "SCAs": SPA, Data-bit DPA, Address-bit DPA, Doubling attack, MRPA, and MZVA. We show that XTR-RSE itself without other countermeasures is secure against all "SCAs". From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs", we think XTR is as suitable to smart-cards as ECC due to the efficiency of the proposed XTR-RSE.

元の言語英語
ページ(範囲)305-317
ページ数13
ジャーナルLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3269
出版物ステータス出版済み - 12 1 2004
外部発表Yes

Fingerprint

Power Analysis
Countermeasures
Attack
Side Channel Attacks
Electronic crime countermeasures
Smart cards
Zero
Smart Card
Doubling
Side channel attack

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

@article{ec3ddd66154645ad8d74c3faa75fffb1,
title = "Modified power-analysis attacks on XTR and an efficient countermeasure",
abstract = "In [HLS04a], Han et al. presented a nice overview of some side channel attacks (SCA), and some classical countermeasures. However, their proposed countermeasures against SCA are so inefficient that the efficiency of XTR with SCA countermeasures is at least 129 times slower than that of XTR without them. Thus they remained the construction of the efficient countermeasures against SCA as an open question. In this paper, we show that XTR can be also attacked by the modified refined power analysis (MRPA) and the modified zero-value attack (MZVA). To show validity of MRPA and MZVA on XTR, we give some numerical data of them. We propose a novel efficient countermeasure (XTR-RSE) against {"}SCAs{"}: SPA, Data-bit DPA, Address-bit DPA, Doubling attack, MRPA, and MZVA. We show that XTR-RSE itself without other countermeasures is secure against all {"}SCAs{"}. From our implementation results, if we compare XTR with ECC with countermeasures against {"}SCAs{"}, we think XTR is as suitable to smart-cards as ECC due to the efficiency of the proposed XTR-RSE.",
author = "Han, {Dong Guk} and Tetsuya Izu and Jongin Lim and Kouichi Sakurai",
year = "2004",
month = "12",
day = "1",
language = "English",
volume = "3269",
pages = "305--317",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Modified power-analysis attacks on XTR and an efficient countermeasure

AU - Han, Dong Guk

AU - Izu, Tetsuya

AU - Lim, Jongin

AU - Sakurai, Kouichi

PY - 2004/12/1

Y1 - 2004/12/1

N2 - In [HLS04a], Han et al. presented a nice overview of some side channel attacks (SCA), and some classical countermeasures. However, their proposed countermeasures against SCA are so inefficient that the efficiency of XTR with SCA countermeasures is at least 129 times slower than that of XTR without them. Thus they remained the construction of the efficient countermeasures against SCA as an open question. In this paper, we show that XTR can be also attacked by the modified refined power analysis (MRPA) and the modified zero-value attack (MZVA). To show validity of MRPA and MZVA on XTR, we give some numerical data of them. We propose a novel efficient countermeasure (XTR-RSE) against "SCAs": SPA, Data-bit DPA, Address-bit DPA, Doubling attack, MRPA, and MZVA. We show that XTR-RSE itself without other countermeasures is secure against all "SCAs". From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs", we think XTR is as suitable to smart-cards as ECC due to the efficiency of the proposed XTR-RSE.

AB - In [HLS04a], Han et al. presented a nice overview of some side channel attacks (SCA), and some classical countermeasures. However, their proposed countermeasures against SCA are so inefficient that the efficiency of XTR with SCA countermeasures is at least 129 times slower than that of XTR without them. Thus they remained the construction of the efficient countermeasures against SCA as an open question. In this paper, we show that XTR can be also attacked by the modified refined power analysis (MRPA) and the modified zero-value attack (MZVA). To show validity of MRPA and MZVA on XTR, we give some numerical data of them. We propose a novel efficient countermeasure (XTR-RSE) against "SCAs": SPA, Data-bit DPA, Address-bit DPA, Doubling attack, MRPA, and MZVA. We show that XTR-RSE itself without other countermeasures is secure against all "SCAs". From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs", we think XTR is as suitable to smart-cards as ECC due to the efficiency of the proposed XTR-RSE.

UR - http://www.scopus.com/inward/record.url?scp=33645587537&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33645587537&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:33645587537

VL - 3269

SP - 305

EP - 317

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -