Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order
スポンサーリンク
概要
- 論文の詳細を見る
Power analysis can be used to attack many implementations of cryptosystems, e.g., RSA and ECC, and the doubling attack is a collision based power analysis performed on two chosen ciphertexts. In this paper, we introduced a modified doubling attack to threaten RSA and ECC implementations by exploiting only one chosen ciphertext of small order. To attack the RSA implementations we selected an input of order two while to attack the ECC implementations we exploited one chosen invalid point of small order on a cryptographically weak curve rather than on the original curve. We showed that several existing power analysis countermeasures for RSA and ECC implementations are still vulnerable to the proposed attack. To prevent the proposed attack, we suggested countermeasures for RSA as well as for ECC.
- (社)電子情報通信学会の論文
- 2011-10-01
著者
-
Yen Sung-ming
Dept Of Computer Science And Information Engineering National Central University
-
Chen Chien-ning
Dept Of Computer Science And Information Engineering National Central University
-
LIEN Wei-Chih
Dept of Computer Science and Information Engineering, National Central University
-
Lien Wei-chih
Dept Of Computer Science And Information Engineering National Central University
-
CHEN Chien-Ning
Dept of Computer Science and Information Engineering, National Central University
関連論文
- On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique
- Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order
- A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction