On security of XTR public key cryptosystems against side channel attacks

Dong Guk Han, Jongin Lim, Kouichi Sakurai

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Citations (Scopus)

    Abstract

    The XTR public key system was introduced at Crypto 2000. It is regarded that XTR is suitable for a variety of environments, including low-end smart cards, and XTR is the excellent alternative to either RSA or ECC. In [LV00a,SL01], authors remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as timing attacks and Differential Power Analysis (DPA). In this paper, however, we investigate the security of side channel attack (SCA) on XTR. This paper shows that XTR-SE is immune against simple power analysis under assumption that the order of the computation of XTR-SE is carefully considered. However, we show that XTR-SE is vulnerable to Data-bit DPA, Address-bit DPA, and doubling attack. Moreover, we propose countermeasures that prevent the proposed attacks. As the proposed countermeasure against doubling attack is very inefficient, a good countermeasure against doubling attack is actually necessary to maintain the advantage of efficiency of XTR.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    EditorsHuaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
    PublisherSpringer Verlag
    Pages454-465
    Number of pages12
    ISBN (Print)9783540223795
    DOIs
    Publication statusPublished - 2004

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume3108
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Keywords

    • Address-bit DPA
    • Data-bit DPA
    • Doubling attack
    • SPA
    • Side Channel Attacks
    • XTR Public Key Cryptosystem

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'On security of XTR public key cryptosystems against side channel attacks'. Together they form a unique fingerprint.

    Cite this