Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-04159-4_22guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

Distinguishing Multiplications from Squaring Operations

Published: 23 August 2009 Publication History

Abstract

In this paper we present a new approach to attacking a modular exponentiation and scalar multiplication based by distinguishing multiplications from squaring operations using the instantaneous power consumption. Previous approaches have been able to distinguish these operations based on information of the specific implementation of the embedded algorithm or the relationship between specific plaintexts. The proposed attack exploits the expected Hamming weight of the result of the computed operations. We extrapolate our observations and assess the consequences for elliptic curve cryptosystems when unified formulæ for point addition are used.

Cited By

View all
  • (2015)Exp-HEProceedings of the 12th International Conference on Embedded Software10.5555/2830865.2830883(157-166)Online publication date: 4-Oct-2015
  • (2015)Two Operands of Multipliers in Side-Channel AttackRevised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 906410.1007/978-3-319-21476-4_5(64-78)Online publication date: 13-Apr-2015
  • (2013)Defeating with fault injection a combined attack resistant exponentiationProceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design10.1007/978-3-642-40026-1_3(32-45)Online publication date: 6-Mar-2013
  • Show More Cited By
  1. Distinguishing Multiplications from Squaring Operations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide books
    Selected Areas in Cryptography: 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers
    August 2009
    456 pages
    ISBN:9783642041587
    • Editors:
    • Roberto Maria Avanzi,
    • Liam Keliher,
    • Francesco Sica

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 23 August 2009

    Author Tags

    1. RSA
    2. Side channel attacks
    3. differential power analysis
    4. modular multiplication and exponentiation
    5. square and multiply algorithm

    Qualifiers

    • Chapter

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Exp-HEProceedings of the 12th International Conference on Embedded Software10.5555/2830865.2830883(157-166)Online publication date: 4-Oct-2015
    • (2015)Two Operands of Multipliers in Side-Channel AttackRevised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 906410.1007/978-3-319-21476-4_5(64-78)Online publication date: 13-Apr-2015
    • (2013)Defeating with fault injection a combined attack resistant exponentiationProceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design10.1007/978-3-642-40026-1_3(32-45)Online publication date: 6-Mar-2013
    • (2013)Correlation Analysis against Protected SFM Implementations of RSAProceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 825010.1007/978-3-319-03515-4_7(98-115)Online publication date: 7-Dec-2013
    • (2012)Complete atomic blocks for elliptic curves in jacobian coordinates over prime fieldsProceedings of the 2nd international conference on Cryptology and Information Security in Latin America10.1007/978-3-642-33481-8_3(37-55)Online publication date: 7-Oct-2012
    • (2011)Square always exponentiationProceedings of the 12th international conference on Cryptology in India10.1007/978-3-642-25578-6_5(40-57)Online publication date: 11-Dec-2011
    • (2009)Random Order m-ary ExponentiationProceedings of the 14th Australasian Conference on Information Security and Privacy10.1007/978-3-642-02620-1_30(437-451)Online publication date: 22-Jun-2009
    • (2009)Exponent Recoding and Regular Exponentiation AlgorithmsProceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology10.1007/978-3-642-02384-2_21(334-349)Online publication date: 19-Jun-2009

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media