On the vulnerability of exponent recodings for the exponentiation against side channel attacks

Yasuyuki Sakai, Kouichi Sakurai

研究成果: ジャーナルへの寄稿学術誌査読

抄録

In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and countermeasures for public key cryptosystems were against the main stage (square and multiply stage) of the modular exponentiation (or the point multiplication on an elliptic curve). We have many algorithms which achieve fast computation of exponentiations. When we compute an exponentiation, the exponent receding has to be carried out before the main stage. There are some exponent receding algorithms including conditional branches, in which instructions depend on the given exponent value. Consequently exponent receding can constitute an information channel, providing the attacker with valuable information on the secret exponent. In this paper we show new algorithms of attack on exponent receding. The proposed algorithms can recover the secret exponent, when the width-w NAF [9] and the unsigned/signed fractional window representation [5] are used. copyright

本文言語英語
ページ(範囲)154-160
ページ数7
ジャーナルIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E88-A
1
DOI
出版ステータス出版済み - 1月 2005

!!!All Science Journal Classification (ASJC) codes

  • 信号処理
  • コンピュータ グラフィックスおよびコンピュータ支援設計
  • 電子工学および電気工学
  • 応用数学

フィンガープリント

「On the vulnerability of exponent recodings for the exponentiation against side channel attacks」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル