Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption

In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yen, Sung-Ming, Lien, Wei-Chih, Moon, SangJae, Ha, JaeCheol
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 195
container_issue
container_start_page 183
container_title
container_volume
creator Yen, Sung-Ming
Lien, Wei-Chih
Moon, SangJae
Ha, JaeCheol
description In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.
doi_str_mv 10.1007/11554868_13
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17198803</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17198803</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</originalsourceid><addsrcrecordid>eNpNkb9u2zAYxNk0AeImnvoCXDJ0UEryoyhyNBznD-CgRdJ2FT7RlMNYJg1SRaslyDvkDfskkZEOueWG-90tR8hnzs45Y9VXzstSaqVrDh_I1FQaSslAMKX4AZlwxXkBIM1H8mkfCG1As0MyYcBEYSoJx2Sa8yMbBdwooSbk6Xv84xKdBeyG7DNtBrr4u-ui731Y0_lDzC7QW5czrh3FsKI3oXdppOk8dp3PPoZM_z2_0F-_u-ASNr7z_UBjO3ad3exHbp19wODzlrYx0bv7WXHhbBp2_dg9JUctdtlN__sJ-Xm5-DG_Lpbfrm7ms2VhQVR9AauyFahkBVZJY62pEJhGpZ116BSWjTRN26xaKZRAoapWaWktKtCl4I2CE3L2trvDbLFrEwbrc71LfotpqHnFjdYMRu7LG5fHKKxdqpsYN7nmrN4fUL87AF4Bqjh1DA</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><source>Springer Books</source><creator>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol</creator><contributor>Vaudenay, Serge ; Dawson, Ed</contributor><creatorcontrib>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol ; Vaudenay, Serge ; Dawson, Ed</creatorcontrib><description>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</description><edition>1ère éd</edition><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540289380</identifier><identifier>ISBN: 9783540289388</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540320661</identifier><identifier>EISBN: 3540320660</identifier><identifier>DOI: 10.1007/11554868_13</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Chosen-message attack ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Side-channel attack ; Signal and communications theory ; Simple power analysis (SPA) ; Smart card ; Software ; Telecommunications and information theory</subject><ispartof>Lecture notes in computer science, 2005, p.183-195</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11554868_13$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11554868_13$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17198803$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Vaudenay, Serge</contributor><contributor>Dawson, Ed</contributor><creatorcontrib>Yen, Sung-Ming</creatorcontrib><creatorcontrib>Lien, Wei-Chih</creatorcontrib><creatorcontrib>Moon, SangJae</creatorcontrib><creatorcontrib>Ha, JaeCheol</creatorcontrib><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><title>Lecture notes in computer science</title><description>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</description><subject>Applied sciences</subject><subject>Chosen-message attack</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Side-channel attack</subject><subject>Signal and communications theory</subject><subject>Simple power analysis (SPA)</subject><subject>Smart card</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540289380</isbn><isbn>9783540289388</isbn><isbn>9783540320661</isbn><isbn>3540320660</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkb9u2zAYxNk0AeImnvoCXDJ0UEryoyhyNBznD-CgRdJ2FT7RlMNYJg1SRaslyDvkDfskkZEOueWG-90tR8hnzs45Y9VXzstSaqVrDh_I1FQaSslAMKX4AZlwxXkBIM1H8mkfCG1As0MyYcBEYSoJx2Sa8yMbBdwooSbk6Xv84xKdBeyG7DNtBrr4u-ui731Y0_lDzC7QW5czrh3FsKI3oXdppOk8dp3PPoZM_z2_0F-_u-ASNr7z_UBjO3ad3exHbp19wODzlrYx0bv7WXHhbBp2_dg9JUctdtlN__sJ-Xm5-DG_Lpbfrm7ms2VhQVR9AauyFahkBVZJY62pEJhGpZ116BSWjTRN26xaKZRAoapWaWktKtCl4I2CE3L2trvDbLFrEwbrc71LfotpqHnFjdYMRu7LG5fHKKxdqpsYN7nmrN4fUL87AF4Bqjh1DA</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Yen, Sung-Ming</creator><creator>Lien, Wei-Chih</creator><creator>Moon, SangJae</creator><creator>Ha, JaeCheol</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</title><author>Yen, Sung-Ming ; Lien, Wei-Chih ; Moon, SangJae ; Ha, JaeCheol</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-3d5f2a6473c649cc97a308a68eceae6a5b49bfbdf4262a267f684cca638521b63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Chosen-message attack</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Side-channel attack</topic><topic>Signal and communications theory</topic><topic>Simple power analysis (SPA)</topic><topic>Smart card</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yen, Sung-Ming</creatorcontrib><creatorcontrib>Lien, Wei-Chih</creatorcontrib><creatorcontrib>Moon, SangJae</creatorcontrib><creatorcontrib>Ha, JaeCheol</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yen, Sung-Ming</au><au>Lien, Wei-Chih</au><au>Moon, SangJae</au><au>Ha, JaeCheol</au><au>Vaudenay, Serge</au><au>Dawson, Ed</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>183</spage><epage>195</epage><pages>183-195</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540289380</isbn><isbn>9783540289388</isbn><eisbn>9783540320661</eisbn><eisbn>3540320660</eisbn><abstract>In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A recently published countermeasure, BRIP, against conventional simple power analysis (SPA) and differential power analysis (DPA) will be shown to be vulnerable to the proposed SPA in this paper. Another well known SPA countermeasure, the square-multiply-always algorithm, will also be shown to be vulnerable to this new attack. Further extension of the proposed attack is possible to develop more powerful attacks.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11554868_13</doi><tpages>13</tpages><edition>1ère éd</edition></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2005, p.183-195
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17198803
source Springer Books
subjects Applied sciences
Chosen-message attack
Computer science
control theory
systems
Cryptography
Exact sciences and technology
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Side-channel attack
Signal and communications theory
Simple power analysis (SPA)
Smart card
Software
Telecommunications and information theory
title Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T09%3A28%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Power%20Analysis%20by%20Exploiting%20Chosen%20Message%20and%20Internal%20Collisions%20%E2%80%93%20Vulnerability%20of%20Checking%20Mechanism%20for%20RSA-Decryption&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Yen,%20Sung-Ming&rft.date=2005&rft.spage=183&rft.epage=195&rft.pages=183-195&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540289380&rft.isbn_list=9783540289388&rft_id=info:doi/10.1007/11554868_13&rft_dat=%3Cpascalfrancis_sprin%3E17198803%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540320661&rft.eisbn_list=3540320660&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true