Side Channel Cryptanalysis on XTR Public Key Cryptosystem(<Special Section>Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
The XTR public key cryptosystem was introduced in 2000. XTR is suitable for a variety of environments including low-end smart cards, and is regarded as an excellent alternative to RSA and ECC. Moreover, it is remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as the timing attack and the differential power analysis (DPA). This paper investigates the security of side channel attack (SCA) on XTR. In this paper, we show the immunity of XTR-SE against the simple power analysis if the order of the computation of XTR-SE is carefully considered. In addition, we show that XTR-SE is vulnerable to the data-bit DPA, the address-bit DPA, the doubling attack, the modified refined power analysis, and the modified zero-value attack. Moreover, we propose some countermeasures against these attacks. We also show experimental results of the efficiency of the countermeasures. From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs, " we think XTR is as suitable to smart cards as ECC.
- 社団法人電子情報通信学会の論文
- 2005-05-01
著者
-
Lim Jongin
Center For Information And Security Technologies (cist) Korea University
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
Han Dong
Center For Information And Security Technologies (cist) Korea University
-
SAKURAI Kouichi
Computer Science and Communication Engineering
-
Izu Tetsuya
Fujitsu Ltd. Kawasaki‐shi Jpn
-
Sakurai Kouichi
Computer & Information Systems Laboratory Mitsubishi Electric Corporation
関連論文
- Extending Bleichenbachers Forgery Attack
- Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- A Note on the Lattice Factoring Method (Cryptography and Information Security)
- Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication(Discrete Mathematics and Its Applications)
- Small Secret CRT-Exponent Attacks on Takagi's RSA
- A Note on the Lattice Factoring Method
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Subliminal Channels for Transferring Signatures: Yet Another Cryptographic Primitive (Special Section on Cryptography and Information Security)
- Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
- Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
- Extending Bleichenbacher's Forgery Attack