Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.5.1099

Vulnerability of Carry Random Scalar Recoding Method against Differential Power Analysis Attack  

Ha, Jaecheol (Hoseo University)
Abstract
The user's secret key can be retrieved by the leakage informations of power consumption occurred during the execution of scalar multiplication for elliptic curve cryptographic algorithm which can be embedded on a security device. Recently, a carry random recoding method is proposed to prevent simple power and differential power analysis attack by recoding the secret key. In this paper, we show that this recoding method is still vulnerable to the differential power analysis attack due to the limitation of the size of carry bits, which is a different from the original claim.
Keywords
Carry Random Recoding; SPA; DPA; Scalar Multiplication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Kocher, "Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, LNCS 1109, pp. 104-113, 1996.
2 J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp. 292-302, 1999.
3 T. Messerges, E. Dabbis, and R. Sloan, "Power analysis attacks of modular exponentiation in smartcard," CHES'99, LNCS 1717, pp. 144-157, 1999.
4 N. Koblitz, "Elliptic curve cryptosystem," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.   DOI
5 M. Joye and S. M. Yen, "The Montgomery Powering Ladder," CHES'02, LNCS 2523, pp. 291-302, 2002.
6 G. Reitwiesner, "Binary arithmetic," Advances in Computers, pp. 231-308, 1960.
7 H. Ryu, S. Cho, T. Kim, C. Kim, and S. Hong, "A new scalar recoding method against side channel attacks," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), 26(3), pp. 587-601, 2016.   DOI
8 D. Hankerson, A. Menezes, and S. Vanstone, "Guide to elliptic curve cryptography," Springer Professional Computing, Springer-Verlag, New York, 2004.
9 S. Mangard, E. Oswald, and T. Popp, Power Analysis attacks-Revealing the secrets of smart cards, Springer, pp. 136-150, 2007.