Side channel cryptanalysis on XTR public key cryptosystem

  • Dong Guk Han*
  • , Tetsuya Izu
  • , Jongin Lim
  • , Kouichi Sakurai
  • *Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    The XTR public key cryptosystem was introduced in 2000. XTR is suitable for a variety of environments including low-end smart cards, and is regarded as an excellent alternative to RSA and ECC. Moreover, it is remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as the timing attack and the differential power analysis (DPA). This paper investigates the security of side channel attack (SCA) on XTR. In this paper, we show the immunity of XTR-SE against the simple power analysis if the order of the computation of XTR-SE is carefully considered. In addition, we show that XTR-SE is vulnerable to the data-bit DPA, the address-bit DPA, the doubling attack, the modified refined power analysis, and the modified zero-value attack. Moreover, we propose some countermeasures against these attacks. We also show experimental results of the efficiency of the countermeasures. From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs." we think XTR is as suitable to smart cards as ECC.

    Original languageEnglish
    Pages (from-to)1214-1223
    Number of pages10
    JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    VolumeE88-A
    Issue number5
    DOIs
    Publication statusPublished - 2005

    Keywords

    • Address-bit DPA
    • Data-bit DPA
    • Doubling attack
    • Refined power analysis
    • SPA
    • Side channel attacks
    • XTR public key cryptosystem
    • Zero-value attack

    ASJC Scopus subject areas

    • Signal Processing
    • Computer Graphics and Computer-Aided Design
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Side channel cryptanalysis on XTR public key cryptosystem'. Together they form a unique fingerprint.

    Cite this