Skip to main content

An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm

  • Conference paper
  • First Online:
  • 2159 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 214))

Abstract

The RSA-CRT algorithm has been widely used because of the efficiency of its exponent operation. The physical susceptibility of RSA-CRT to various side channel attacks has been investigated in several studies. Boer et al. proposed MRED (Modular Reduction on Equidistant Data), a brilliant differential power analysis (DPA) of CRT reduction with equidistant chosen messages. This attack targets intermediate data that depend on the \(r=x\mathrm{{mod}}p\) value. We introduce a new approach the MRED attack, related to a subtraction algorithm that is not solely based on the \(r\) value. Our approach is superficially similar to previous DPA attacks; however, is based on a totally different assumption from that of data dependent analysis. According to our results, only 256 traces are needed to reduce 1 block key to 2 key candidates, so it is a more efficient analysis method on restricted trace environments. Moreover, it can be used to attack a data-dependent trace system. One example of this kind of attack is non-Hamming weight. We describe our technique with its advantages and disadvantages, and we show simulation results using an MSP430 and based software board.

This work was supported by the communication R&D program of KCC/KCA. [12-921-06-001, “Development of MTM-based Security Core Technology for Prevention of Information Leakage in Smart Devices”

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kocher, P., Jaffe, J., Jun, B.: Timming attacks on implementations of diffe-hellman, rsa, dss, and other systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 96 (1996). ISBN 3-540-61512-1

    Google Scholar 

  2. Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks, 1998, White paper, cryptography research. http://www.cryptography.com/dpa/technical (1998)

  3. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: proceedings of CHES 2004, LNCS3156, pp. 16–29 (2004)

    Google Scholar 

  4. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  5. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Proceedings of CHES 99, LNCS1717, pp. 144–157 (1999)

    Google Scholar 

  6. Boer, B.D., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a crt implementation of RSA. In: Proceedings of CHES 2002, LNCS2523, pp. 228–243 (2002)

    Google Scholar 

  7. Park, J., Han, D., Yi, O., Choi, D.: Ghost key patterns of MRED power analysis on RSA-CRT. In: SCIS 2011, Kitakyushu Japan (2011)

    Google Scholar 

  8. Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: SAC 2007, LNCS4876, pp. 110–125 (2007)

    Google Scholar 

  9. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook Applied Cryptography. CRC press, Boca Raton (1996). ISBN: 0-8493-8523-7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Yeon Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Park, JY., Han, DG., Yi, O., Kim, J. (2013). An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5857-5_34

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5856-8

  • Online ISBN: 978-94-007-5857-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics