Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Communication Dans Un Congrès Année : 2024

Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure

Résumé

Current public key cryptographic algorithms (RSA, DSA, ECDSA) can be threaten by side channel analyses. The main approach to counter-act such attacks consists in randomizing sensitive data and address bits used in loads and stores of an exponentiation algorithm. In this paper we study a recent counter-measure "Boolean split exponent" (Tunstall et al. 2018) preventing differential power analysis on address bits. We show that one of their proposed protections has a flaw. We derive an attack exploiting this flaw and we successfully apply it on a simulated power consumption of an RSA modular exponentiation.
Fichier principal
Vignette du fichier
dpa-randomized-address4.pdf (159.38 Ko) Télécharger le fichier
Origine Fichiers produits par l'(les) auteur(s)
Licence

Dates et versions

lirmm-04462427 , version 1 (16-02-2024)

Licence

Identifiants

Citer

Christophe Negre. Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure. SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.632-637, ⟨10.5220/0009891306320637⟩. ⟨lirmm-04462427⟩
26 Consultations
46 Téléchargements

Altmetric

Partager

Gmail Mastodon Facebook X LinkedIn More