Abstract | ||
---|---|---|
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by a cryptographic module, and reveals a secret key in the module. We focus on chosen-message SPA attacks, which enhances the differences of operating waveforms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, Yen showed a unique SPA attack against RSA cryptosystem, but no verification experiment using actual software or hardware was performed. In this paper, we implemented four-types of RSA processors on an FPGA platform in combination with two variants of the Montgomery multiplication algorithm and two different types of multipliers for SPA attacks experiments. Then we demonstrated effectiveness of various chosen-message attacks as well as Yen's method, and investigated the characteristics of the attacks depending on the hardware architectures. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/FPL.2008.4629904 | 2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2 |
Keywords | Field | DocType |
cryptography,delta modulation,public key cryptography,cathode ray tubes,hardware,classification algorithms,field programmable gate arrays,hardware architecture,montgomery multiplication | Power analysis,Computer science,Cryptography,Delta modulation,Parallel computing,Field-programmable gate array,Cryptosystem,Multiplication,Software,Public-key cryptography | Conference |
ISSN | Citations | PageRank |
1946-1488 | 5 | 0.56 |
References | Authors | |
8 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Atsushi Miyamoto | 1 | 61 | 5.16 |
Naofumi Homma | 2 | 377 | 53.81 |
Takafumi Aoki | 3 | 915 | 125.99 |
Akashi Satoh | 4 | 866 | 69.99 |