Mostrar el registro sencillo del ítem
Horizontal Correlation Analysis on Exponentiation
hal.structure.identifier | DMI | |
dc.contributor.author | CLAVIER, Christophe | |
hal.structure.identifier | Inside Contactless | |
dc.contributor.author | FEIX, Benoit | |
hal.structure.identifier | DMI | |
hal.structure.identifier | Inside Contactless | |
dc.contributor.author | GAGNEROT, Georges | |
hal.structure.identifier | Inside Contactless | |
dc.contributor.author | ROUSSELLET, Mylène | |
hal.structure.identifier | Inside Contactless | |
hal.structure.identifier | Lithe and fast algorithmic number theory [LFANT] | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | VERNEUIL, Vincent | |
dc.contributor.editor | Juan Hernández-Serrano | |
dc.date.accessioned | 2024-04-04T02:28:06Z | |
dc.date.available | 2024-04-04T02:28:06Z | |
dc.date.created | 2010 | |
dc.date.issued | 2010-12 | |
dc.date.conference | 2010-12-15 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/190070 | |
dc.description.abstractEn | We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the Big Mac attack from Walter, longer keys may facilitate this analysis and success will depend on the arithmetic coprocessor characteristics. We present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to our attack. Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding. Also, contrarily to the Big Mac attack, it applies even in the case of regular implementations such as the square and multiply always or the Montgomery ladder. We also point out that DSA and Diffie-Hellman exponentiations are no longer immune against CPA. Then we discuss the efficiency of known countermeasures, and we finally present some new ones. | |
dc.language.iso | en | |
dc.publisher | Springer | |
dc.rights.uri | http://hal.archives-ouvertes.fr/licences/copyright/ | |
dc.title.en | Horizontal Correlation Analysis on Exponentiation | |
dc.type | Communication dans un congrès | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
bordeaux.page | tbd | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | Twelfth International Conference on Information and Communications Security | |
bordeaux.country | ES | |
bordeaux.conference.city | Barcelona | |
bordeaux.peerReviewed | oui | |
hal.identifier | inria-00540384 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.conference.organizer | Universitat Politècnica de Catalunya | |
hal.conference.end | 2010-12-17 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//inria-00540384v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2010-12&rft.spage=tbd&rft.epage=tbd&rft.au=CLAVIER,%20Christophe&FEIX,%20Benoit&GAGNEROT,%20Georges&ROUSSELLET,%20Myl%C3%A8ne&VERNEUIL,%20Vincent&rft.genre=unknown |
Archivos en el ítem
Archivos | Tamaño | Formato | Ver |
---|---|---|---|
No hay archivos asociados a este ítem. |