Presentation | 2002/11/8 A Multiple Power Analysis Attack Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Method at CHES 2001 Katsuyuki OKEYA, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We show that the advanced version of a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to a multiple power analysis attack, a new kind of side channel attack. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure has been proposed by Oswald-Aigner, and is a random decision inserted into computations. The countermeasure has two versions; the basic version and the advanced version. The basic version has been proved to be vulnerable to a side channel attack. This is due to a shrink of states for randomization if a bit of the secret scalar is zero. However, the advanced version does not have such a. shrink. Thus, the advanced version's immunity to side channel attacks is still controversial. The multiple power analysis uses plural AD sequences, which are sequences of additions and doublings, and obtained by the distinguishability and measurements. The multiple power analysis relates the AD sequences each other, and deduces the secret scalar. A point of the multiple power analysis against, the advanced version is that two different states are combined, and regarded as the same state. This provides a shrink of states if a bit of the secret scalar is zero. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Elliptic Curve Cryptosystems / Side Channel Attacks / Randomized Addition-Subtraction Chains Conutermeasure / Advanced Version / Simple Power Analysis / Multiple Power Analysis |
Paper # | ISEC2002-93 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2002/11/8(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Multiple Power Analysis Attack Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Method at CHES 2001 |
Sub Title (in English) | |
Keyword(1) | Elliptic Curve Cryptosystems |
Keyword(2) | Side Channel Attacks |
Keyword(3) | Randomized Addition-Subtraction Chains Conutermeasure |
Keyword(4) | Advanced Version |
Keyword(5) | Simple Power Analysis |
Keyword(6) | Multiple Power Analysis |
1st Author's Name | Katsuyuki OKEYA |
1st Author's Affiliation | Hitachi, Ltd., Systems Development Laboratory() |
2nd Author's Name | Kouichi SAKURAI |
2nd Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University |
Date | 2002/11/8 |
Paper # | ISEC2002-93 |
Volume (vol) | vol.102 |
Number (no) | 437 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |