SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

Abstract : The MIST algorithm is a randomized version of the division chain exponentiation algorithm and is a side-channel countermeasure. When analyzing the MIST algorithm by ordinary simple power analysis (with only one square-multiply sequence obtained), an attacker cannot retrieve the secret exponent due to the ambiguous relationship between the square-multiply sequence and the computation. We point out the MIST algorithm is still vulnerable to simple power analysis observing multiple power consumption traces and propose a practical method with detailed steps to deduce the secret exponent from multiple square-multiply sequences. Further countermeasures such as exponent blinding are required to prevent the analysis proposed in this paper.
Type de document :
Communication dans un congrès
Alfredo Cuzzocrea; Christian Kittl; Dimitris E. Simos; Edgar Weippl; Lida Xu. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. Springer, Lecture Notes in Computer Science, LNCS-8128, pp.222-235, 2013, Security Engineering and Intelligence Informatics
Liste complète des métadonnées

Littérature citée [12 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01506557
Contributeur : Hal Ifip <>
Soumis le : mercredi 12 avril 2017 - 10:24:54
Dernière modification le : jeudi 13 avril 2017 - 01:06:52
Document(s) archivé(s) le : jeudi 13 juillet 2017 - 12:32:30

Fichier

978-3-642-40588-4_16_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

  • HAL Id : hal-01506557, version 1

Citation

Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen. SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences. Alfredo Cuzzocrea; Christian Kittl; Dimitris E. Simos; Edgar Weippl; Lida Xu. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. Springer, Lecture Notes in Computer Science, LNCS-8128, pp.222-235, 2013, Security Engineering and Intelligence Informatics. 〈hal-01506557〉

Partager

Métriques

Consultations de la notice

61

Téléchargements de fichiers

32