Title
Enhanced power analysis attack using chosen message against RSA hardware implementations
Abstract
SPA (simple power analysis) attacks against RSA cryptosystems are enhanced by using chosen-message scenarios. One of the most powerful chosen-message SPA attacks was proposed by Yen et. al. in 2005, which can be applied to various algorithms and architectures, and can defeat the most popular SPA countermeasure using dummy multiplication. Special input values of -1 and a pair of -X and X can be used to identify squaring operations performed depending on key bit stream. However, no experimental result on actual implementation was reported. In this paper, we implemented some RSA processors on an FPGA platform and demonstrated that Yen's attack with a signal filtering technique clearly reveal the secret key information in the actual power waveforms.
Year
DOI
Venue
2008
10.1109/ISCAS.2008.4542159
Seattle, WA
Keywords
Field
DocType
cryptography,field programmable gate arrays,filtering theory,FPGA,RSA cryptosystems,chosen-message scenarios,dummy multiplication,hardware implementations,signal filtering,simple power analysis
Power analysis,Cryptography,Computer science,Parallel computing,Waveform,Field-programmable gate array,Filter (signal processing),Cryptosystem,Electronic engineering,Multiplication,Bitstream,Computer engineering
Conference
ISSN
ISBN
Citations 
0271-4302
978-1-4244-1684-4
8
PageRank 
References 
Authors
0.63
7
4
Name
Order
Citations
PageRank
Atsushi Miyamoto1615.16
Naofumi Homma237753.81
Takafumi Aoki3915125.99
Akashi Satoh486669.99