Vertical and horizontal correlation attacks on RNS-based exponentiations

Guilherme Perin 1 Laurent Imbert 2 Philippe Maurine 1 Lionel Torres 3
1 SmartIES - Smart Integrated Electronic Systems
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
2 ECO - Exact Computing
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
3 ADAC - ADAptive Computing
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Side-channel attacks are a serious threat for physical implementations of public-key cryptosystems and notably for the RSA. Side-channel leakages can be explored from unprotected cryptodevices and several power or electromagnetic traces are collected in order to construct (vertical) differential side-channel attacks. On exponentiations, the so-called horizontal correlation attacks originally proposed by Walter in 2001 and improved by Clavier et al in 2010 demonstrated to be efficient even in the presence of strong countermeasures like the exponent and message blinding. In particular, a single trace is sufficient to recover the secret if the modular exponentiation features long-integer multiplications. In this paper, we consider the application of vertical and horizontal correlation attacks on RNS-based approaches. The Montgomery multiplication, which is widely adopted in the finite ring of an exponentiation, has different construction details in the RNS domain. Experiments are conducted on hardware (parallel) and software (sequential) and leakage models for known and masked inputs are constructed for the regular and SPA-protected Montgomery ladder algorithm.
Document type :
Journal articles
Complete list of metadatas

Cited literature [34 references]  Display  Hide  Download

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01269799
Contributor : Philippe Maurine <>
Submitted on : Friday, February 5, 2016 - 12:03:27 PM
Last modification on : Wednesday, October 9, 2019 - 9:42:02 AM
Long-term archiving on : Saturday, November 12, 2016 - 11:17:58 AM

File

paper_JCE_v4_revised.pdf
Files produced by the author(s)

Identifiers

Collections

Citation

Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres. Vertical and horizontal correlation attacks on RNS-based exponentiations. Journal of Cryptographic Engineering, Springer, 2015, 5 (3), pp.171-185. ⟨10.1007/s13389-015-0095-0⟩. ⟨lirmm-01269799⟩

Share

Metrics

Record views

406

Files downloads

795