Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption
In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) a...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 195 |
---|---|
container_issue | |
container_start_page | 183 |
container_title | |
container_volume | |
creator | Yen, Sung-Ming Lien, Wei-Chih Moon, SangJae Ha, JaeCheol |
description | In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks. |
doi_str_mv | 10.1007/11554868_13 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17198803</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17198803</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</originalsourceid><addsrcrecordid>eNpNkb9u2zAYxNk0AeImnvoCXDJ0UEryoyhyNBznD-CgRdJ2FT7RlMNYJg1SRaslyDvkDfskkZEOueWG-90tR8hnzs45Y9VXzstSaqVrDh_I1FQaSslAMKX4AZlwxXkBIM1H8mkfCG1As0MyYcBEYSoJx2Sa8yMbBdwooSbk6Xv84xKdBeyG7DNtBrr4u-ui731Y0_lDzC7QW5czrh3FsKI3oXdppOk8dp3PPoZM_z2_0F-_u-ASNr7z_UBjO3ad3exHbp19wODzlrYx0bv7WXHhbBp2_dg9JUctdtlN__sJ-Xm5-DG_Lpbfrm7ms2VhQVR9AauyFahkBVZJY62pEJhGpZ116BSWjTRN26xaKZRAoapWaWktKtCl4I2CE3L2trvDbLFrEwbrc71LfotpqHnFjdYMRu7LG5fHKKxdqpsYN7nmrN4fUL87AF4Bqjh1DA</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><source>Springer Books</source><creator>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol</creator><contributor>Vaudenay, Serge ; Dawson, Ed</contributor><creatorcontrib>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol ; Vaudenay, Serge ; Dawson, Ed</creatorcontrib><description>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</description><edition>1ère éd</edition><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540289380</identifier><identifier>ISBN: 9783540289388</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540320661</identifier><identifier>EISBN: 3540320660</identifier><identifier>DOI: 10.1007/11554868_13</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Chosen-message attack ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Side-channel attack ; Signal and communications theory ; Simple power analysis (SPA) ; Smart card ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.183-195</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11554868_13$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11554868_13$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17198803$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Vaudenay, Serge</contributor><contributor>Dawson, Ed</contributor><creatorcontrib>Yen, Sung-Ming</creatorcontrib><creatorcontrib>Lien, Wei-Chih</creatorcontrib><creatorcontrib>Moon, SangJae</creatorcontrib><creatorcontrib>Ha, JaeCheol</creatorcontrib><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><title>Lecture notes in computer science</title><description>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</description><subject>Applied sciences</subject><subject>Chosen-message attack</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Side-channel attack</subject><subject>Signal and communications theory</subject><subject>Simple power analysis (SPA)</subject><subject>Smart card</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540289380</isbn><isbn>9783540289388</isbn><isbn>9783540320661</isbn><isbn>3540320660</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkb9u2zAYxNk0AeImnvoCXDJ0UEryoyhyNBznD-CgRdJ2FT7RlMNYJg1SRaslyDvkDfskkZEOueWG-90tR8hnzs45Y9VXzstSaqVrDh_I1FQaSslAMKX4AZlwxXkBIM1H8mkfCG1As0MyYcBEYSoJx2Sa8yMbBdwooSbk6Xv84xKdBeyG7DNtBrr4u-ui731Y0_lDzC7QW5czrh3FsKI3oXdppOk8dp3PPoZM_z2_0F-_u-ASNr7z_UBjO3ad3exHbp19wODzlrYx0bv7WXHhbBp2_dg9JUctdtlN__sJ-Xm5-DG_Lpbfrm7ms2VhQVR9AauyFahkBVZJY62pEJhGpZ116BSWjTRN26xaKZRAoapWaWktKtCl4I2CE3L2trvDbLFrEwbrc71LfotpqHnFjdYMRu7LG5fHKKxdqpsYN7nmrN4fUL87AF4Bqjh1DA</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Yen, Sung-Ming</creator><creator>Lien, Wei-Chih</creator><creator>Moon, SangJae</creator><creator>Ha, JaeCheol</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><author>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Chosen-message attack</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Side-channel attack</topic><topic>Signal and communications theory</topic><topic>Simple power analysis (SPA)</topic><topic>Smart card</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yen, Sung-Ming</creatorcontrib><creatorcontrib>Lien, Wei-Chih</creatorcontrib><creatorcontrib>Moon, SangJae</creatorcontrib><creatorcontrib>Ha, JaeCheol</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yen, Sung-Ming</au><au>Lien, Wei-Chih</au><au>Moon, SangJae</au><au>Ha, JaeCheol</au><au>Vaudenay, Serge</au><au>Dawson, Ed</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>183</spage><epage>195</epage><pages>183-195</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540289380</isbn><isbn>9783540289388</isbn><eisbn>9783540320661</eisbn><eisbn>3540320660</eisbn><abstract>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11554868_13</doi><tpages>13</tpages><edition>1ère éd</edition></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.183-195 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17198803 |
source | Springer Books |
subjects | Applied sciences Chosen-message attack Computer science control theory systems Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Side-channel attack Signal and communications theory Simple power analysis (SPA) Smart card Software Telecommunications and information theory |
title | Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T09%3A28%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Power%20Analysis%20by%20Exploiting%20Chosen%20Message%20and%20Internal%20Collisions%20%E2%80%93%20Vulnerability%20of%20Checking%20Mechanism%20for%20RSA-Decryption&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Yen,%20Sung-Ming&rft.date=2005&rft.spage=183&rft.epage=195&rft.pages=183-195&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540289380&rft.isbn_list=9783540289388&rft_id=info:doi/10.1007/11554868_13&rft_dat=%3Cpascalfrancis_sprin%3E17198803%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540320661&rft.eisbn_list=3540320660&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |