z-logo
open-access-imgOpen Access
New single‐trace side‐channel attacks on a specific class of Elgamal cryptosystem
Author(s) -
Mahdion Parinaz,
Soleimany Hadi,
Habibi Pouya,
Moazami Farokhlagha
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2019.0044
Subject(s) - elgamal encryption , ciphertext , computer science , cryptosystem , ciphertext indistinguishability , semantic security , malleability , side channel attack , computer security , theoretical computer science , cryptography , public key cryptography , encryption , attribute based encryption
The so‐called N − 1 attack is one of the most important order‐2 element attacks, as it requires a non‐adaptive chosen ciphertext which is considered as a more realistic attack model compared to adaptive chosen ciphertext scenario. To protect the implementation against N − 1 attack, several literatures propose the simplest solution, i.e. ‘block the special message N − 1 ’. In this study, the authors conduct an in‐depth research on the N − 1 attack based on the SMA and Montgomery ladder (ML) algorithms. They show that despite the unaccepted ciphertext N − 1 countermeasure, other types of N − 1 attacks are applicable to specific classes of Elgamal cryptosystems. They propose new chosen‐message power‐analysis attacks with order‐4 elements which utilise a chosen ciphertext c such that c 2 = − 1 mod p where p is the prime number used as a modulus in Elgamal. Such a ciphertext can be found simply when p ≡ 1 mod 4 . They demonstrate that ML and SMA algorithms are subjected to the new N − 1 ‐type attack by utilising a different ciphertext. They implement the proposed attacks on the TARGET Board of the ChipWhisperer CW1173 and the proposed experiments validate the feasibility and effectiveness of the attacks by using only a single power trace.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom