Title
A Multiple Power Analysis Breaks The Advanced Version Of The Randomized Addition-Subtraction Chains Countermeasure Against Side Channel Attacks
Abstract
We show that the advanced version of a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to a multiple power analysis attack, a new kind of side channel attack, under distinguishability between addition and doubling. The side channel attack takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure was proposed by Oswald-Aigner, and is based on a random decision inserted into computations. The countermeasure has two versions; the basic version and the advanced version. The basic version has been proved to be vulnerable to a side channel attack. This is due to a shrink of states for randomization if a bit of the secret scalar is zero. However, the advanced version does not have such a shrink. The multiple power analysis uses plural AD sequences, which are sequences of additions and doublings, and obtained by the distinguishability and measurements, The multiple power analysis relates the AD sequences each other, and deduces the secret scalar. A point of the multiple power analysis against the advanced version is that two different states are combined, and regarded as the same state. This provides a shrink of states if a bit of the secret scalar is zero.
Year
DOI
Venue
2003
10.1109/ITW.2003.1216723
2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS
Keywords
Field
DocType
side channel attacks,sequences,cryptography,power analysis
Countermeasure,Power analysis,Cryptography,Computer science,Scalar (physics),Theoretical computer science,Side channel attack,Subtraction,Computation
Conference
Citations 
PageRank 
References 
4
0.50
5
Authors
2
Name
Order
Citations
PageRank
Katsuyuki Okeya144738.47
Kouichi Sakurai21514213.71