Abstract
The RSA-CRT algorithm has been widely used because of the efficiency of its exponent operation. The physical susceptibility of RSA-CRT to various side channel attacks has been investigated in several studies. Boer et al. proposed MRED (Modular Reduction on Equidistant Data), a brilliant differential power analysis (DPA) of CRT reduction with equidistant chosen messages. This attack targets intermediate data that depend on the \(r=x\mathrm{{mod}}p\) value. We introduce a new approach the MRED attack, related to a subtraction algorithm that is not solely based on the \(r\) value. Our approach is superficially similar to previous DPA attacks; however, is based on a totally different assumption from that of data dependent analysis. According to our results, only 256 traces are needed to reduce 1 block key to 2 key candidates, so it is a more efficient analysis method on restricted trace environments. Moreover, it can be used to attack a data-dependent trace system. One example of this kind of attack is non-Hamming weight. We describe our technique with its advantages and disadvantages, and we show simulation results using an MSP430 and based software board.
This work was supported by the communication R&D program of KCC/KCA. [12-921-06-001, “Development of MTM-based Security Core Technology for Prevention of Information Leakage in Smart Devices”
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kocher, P., Jaffe, J., Jun, B.: Timming attacks on implementations of diffe-hellman, rsa, dss, and other systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO 96 (1996). ISBN 3-540-61512-1
Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks, 1998, White paper, cryptography research. http://www.cryptography.com/dpa/technical (1998)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: proceedings of CHES 2004, LNCS3156, pp. 16–29 (2004)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Proceedings of CHES 99, LNCS1717, pp. 144–157 (1999)
Boer, B.D., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a crt implementation of RSA. In: Proceedings of CHES 2002, LNCS2523, pp. 228–243 (2002)
Park, J., Han, D., Yi, O., Choi, D.: Ghost key patterns of MRED power analysis on RSA-CRT. In: SCIS 2011, Kitakyushu Japan (2011)
Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: SAC 2007, LNCS4876, pp. 110–125 (2007)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook Applied Cryptography. CRC press, Boca Raton (1996). ISBN: 0-8493-8523-7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Park, JY., Han, DG., Yi, O., Kim, J. (2013). An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_34
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_34
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)