Presentation | 2002/9/13 A DPA Attack Breaks a Window-based Countermeasure against Side Channel Attacks Katsuyuki OKEYA, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Moller proposed a countermeasure using window method against side channel attacks. However, its immunity to side channel attacks is still controversial. In this paper, we show Moller's countermeasure is vulnerable to a second-order differential power analysis attack. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. An nth-order differential power analysis attack is the side channel attack which uses n different leaked data that correspond to n different intermediate values during the execution. Our proposed attack against Moller's countermeasure finds out the use of same elliptic points, and restricts candidates of the secret scalar value. In these circumstances, the attack completely detects the scalar value using Baby-Step-Giant-Step method as a direct-computational attack. For a 160-bit scalar value, the proposed attack restricts the candidates of the scalar within about 2^<45> possibilities, and the direct-computational attack can actually detect the scalar value. Besides, we improve Moller's countermeasure to prevent the proposed attack. We compare the original method and improved countermeasure in terms of the computational intractability and the computational cost of the scalar multiplication. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Elliptic Curve Cryptosystems / Side Channel Attacks / Differential Power Analysis / Higher-Order DPA Attack / Second-Order DPA Attack / Moller's Countermeasure |
Paper # | ISEC2002-60 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2002/9/13(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A DPA Attack Breaks a Window-based Countermeasure against Side Channel Attacks |
Sub Title (in English) | |
Keyword(1) | Elliptic Curve Cryptosystems |
Keyword(2) | Side Channel Attacks |
Keyword(3) | Differential Power Analysis |
Keyword(4) | Higher-Order DPA Attack |
Keyword(5) | Second-Order DPA Attack |
Keyword(6) | Moller's Countermeasure |
1st Author's Name | Katsuyuki OKEYA |
1st Author's Affiliation | Hitachi, Ltd., Systems Development Laboratory() |
2nd Author's Name | Kouichi SAKURAI |
2nd Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University |
Date | 2002/9/13 |
Paper # | ISEC2002-60 |
Volume (vol) | vol.102 |
Number (no) | 323 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |