z-logo
open-access-imgOpen Access
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Author(s) -
Kim Tae Hyun,
Han DongGuk,
Okeya Katsuyuki,
Lim Jongin
Publication year - 2007
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.07.0106.0220
Subject(s) - power analysis , side channel attack , cryptosystem , binary number , cryptography , computer science , elliptic curve cryptography , computer security , arithmetic , power (physics) , theoretical computer science , key (lock) , channel (broadcasting) , computer engineering , algorithm , public key cryptography , mathematics , computer network , encryption , physics , quantum mechanics
Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here