A new attack with side channel leakage during exponent recoding computations

Yasuyuki Sakai, Kouichi Sakurai

研究成果: 書籍/レポート タイプへの寄稿

5 被引用数 (Scopus)

抄録

In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and countermeasures for public key cryptosystems were against the main stage (square and multiply stage) of the modular exponentiation (or the point multiplication on an elliptic curve). We have many algorithms which achieve fast computation of exponentiations. When we compute an exponentiation, the exponent recoding has to be carried out before the main stage. There are some exponent recoding algorithms including conditional branches, in which instructions depend on the given exponent value. Consequently exponent recoding can constitute an information channel, providing the attacker with valuable information on the secret exponent. In this paper we show new algorithms of attack on exponent recoding. The proposed algorithms can recover the secret exponent, when the width-ω NAF [9] and the unsigned/signed fractional window representation [5] are used. Keywords: Side channel attack, exponent recoding, RSA cryptosystems, elliptic curve cryptosystems.

本文言語英語
ホスト出版物のタイトルLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
編集者Marc Joye, Jean-Jacques Quisquater
出版社Springer Verlag
ページ298-311
ページ数14
ISBN(印刷版)3540226664, 9783540226666
DOI
出版ステータス出版済み - 2004

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3156
ISSN(印刷版)0302-9743
ISSN(電子版)1611-3349

!!!All Science Journal Classification (ASJC) codes

  • 理論的コンピュータサイエンス
  • コンピュータサイエンス一般

フィンガープリント

「A new attack with side channel leakage during exponent recoding computations」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル