Abstract
We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.
Original language | English |
---|---|
Pages (from-to) | 1316-1326 |
Number of pages | 11 |
Journal | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
Volume | E89-A |
Issue number | 5 |
DOIs | |
Publication status | Published - 2006 May |
Keywords
- Agagliate et al.'s countermeasure
- BSD representation
- DPA
- Ebeid-Hasan countermeasure
- Elliptic curve cryptosystem
- Ha-Moon countermeasure
- SPA
- Side channel attacks
ASJC Scopus subject areas
- Signal Processing
- Computer Graphics and Computer-Aided Design
- Electrical and Electronic Engineering
- Applied Mathematics