Header menu link for other important links
X
Template attack on SPA and FA resistant implementation of Montgomery ladder
Published in Institution of Engineering and Technology
2016
Volume: 10
   
Issue: 5
Pages: 245 - 251
Abstract
Hardware implementations of the well-known Rivest-Shamir-Adleman (RSA) algorithm have been shown to be vulnerable to power and fault analysis (FA) attacks. To implement protected designs of RSA-Chinese remainder theorem in embedded devices, like smart cards or RFIDs, the one needs to find solutions which require less computations as well as incurs low storage overheads. One such efficient scheme was proposed by Joye et al. in CHES'02 and it was claimed to be secure against both simple power analysis (SPA) and FA attacks. In this study, the authors demonstrate a template attack (TA) against Joye's countermeasure and show that the scheme can be broken with a low number of power traces. In addition, the authors report the experimental results of the proposed attack against an implementation of Joye's scheme on a Xilinx Microblaze soft-core processor of SASEBO-W standard side-channel analysis board. The authors used least squares support vector machine (LS-SVM) based binary classifiers to analyse the collected power traces. The authors also describe the potential threat posed by cache timing attacks on Joye's ladder in presence of a concurrently running spy process and outline a probable countermeasure to the posed attacks. © The Institution of Engineering and Technology 2016.
About the journal
JournalIET Information Security
PublisherInstitution of Engineering and Technology
ISSN17518709
Open AccessNo
Concepts (14)
  •  related image
    Algorithms
  •  related image
    Hardware
  •  related image
    Ladders
  •  related image
    Smart cards
  •  related image
    Support vector machines
  •  related image
    CACHE TIMING ATTACKS
  •  related image
    CHINESE REMAINDER THEOREM
  •  related image
    Hardware implementations
  •  related image
    LEAST SQUARES SUPPORT VECTOR MACHINES
  •  related image
    RIVEST-SHAMIR-ADLEMAN
  •  related image
    SIDE-CHANNEL ANALYSIS
  •  related image
    SIMPLE POWER ANALYSIS
  •  related image
    SOFT-CORE PROCESSORS
  •  related image
    Side channel attack