Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Conference Papers Year : 2024

Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure

Abstract

Current public key cryptographic algorithms (RSA, DSA, ECDSA) can be threaten by side channel analyses. The main approach to counter-act such attacks consists in randomizing sensitive data and address bits used in loads and stores of an exponentiation algorithm. In this paper we study a recent counter-measure "Boolean split exponent" (Tunstall et al. 2018) preventing differential power analysis on address bits. We show that one of their proposed protections has a flaw. We derive an attack exploiting this flaw and we successfully apply it on a simulated power consumption of an RSA modular exponentiation.
Fichier principal
Vignette du fichier
dpa-randomized-address4.pdf (159.38 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Licence : CC BY NC ND - Attribution - NonCommercial - NoDerivatives

Dates and versions

lirmm-04462427 , version 1 (16-02-2024)

Identifiers

Cite

Christophe Negre. Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure. SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.632-637, ⟨10.5220/0009891306320637⟩. ⟨lirmm-04462427⟩
2 View
3 Download

Altmetric

Share

Gmail Facebook X LinkedIn More