Loading...
Please wait, while we are loading the content...
Similar Documents
An improved and efficient countermeasure against power analysis attacks (2005).
| Content Provider | CiteSeerX |
|---|---|
| Author | Kim, Changkyun Ha, Jaecheol Moon, Sangjae Yen, Sung-Ming Lien, Wei-Chih Kim, Sung-Hyun |
| Abstract | Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA attacks are vulnerable to these new DPA attacks which include refined power analysis attacks (RPA), zero-value point attacks (ZPA), and doubling attacks. The new attacks are different from classical DPA in that RPA uses a special point with a zero-value coordinate, while ZPA uses auxiliary registers to locate a zero value. So, Mamiya et al proposed a new countermeasure against RPA, ZPA, classical DPA and SPA attacks using a basic random initial point. His countermeasure works well when applied to ECC, but it has some disadvantages when applied to general exponentiation algorithms (such as RSA and ElGamal) due to an inverse computation. This paper presents an efficient and improved countermeasure against the above new DPA attacks by using a random blinding concept on the message different from Mamiya's countermeasure and show that our proposed countermeasure is secure against SPA based Yen's power analysis which can break Coron's simple SPA countermeasure as well as Mamiya's one. The computational cost of the proposed scheme is very low when compared to the previous methods which rely on Coron's simple SPA countermeasure. Moreover this scheme is a generalized countermeasure which can be applied to ECC as well as RSA system. |
| File Format | |
| Publisher Date | 2005-01-01 |
| Access Restriction | Open |
| Subject Keyword | Power Analysis Attack Efficient Countermeasure New Dpa Attack Rsa System Classical Dpa Simple Spa Countermeasure Computational Cost Power Analysis Special Point Auxiliary Register Classical Dpa Attack Spa Attack General Exponentiation Algorithm New Attack Zero-value Point Attack Existing Countermeasure Improved Countermeasure Inverse Computation Previous Method New Countermeasure Differential Power Analysis Attack Elliptic Curve Cryptosystems Basic Random Initial Point Refined Power Analysis Attack Generalized Countermeasure Zero-value Coordinate |
| Content Type | Text |
| Resource Type | Article |