TY - GEN
T1 - Distinguishing multiplications from squaring operations
AU - Amiel, Frederic
AU - Feix, Benoit
AU - Tunstall, Michael
AU - Whelan, Claire
AU - Marnane, William P.
PY - 2008
Y1 - 2008
N2 - In this paper we present a new approach to attacking a modular exponentiation and scalar multiplication based by distinguishing multiplications from squaring operations using the instantaneous power consumption. Previous approaches have been able to distinguish these operations based on information of the specific implementation of the embedded algorithm or the relationship between specific plaintexts. The proposed attack exploits the expected Hamming weight of the result of the computed operations. We extrapolate our observations and assess the consequences for elliptic curve cryptosystems when unified formulæ for point addition are used.
AB - In this paper we present a new approach to attacking a modular exponentiation and scalar multiplication based by distinguishing multiplications from squaring operations using the instantaneous power consumption. Previous approaches have been able to distinguish these operations based on information of the specific implementation of the embedded algorithm or the relationship between specific plaintexts. The proposed attack exploits the expected Hamming weight of the result of the computed operations. We extrapolate our observations and assess the consequences for elliptic curve cryptosystems when unified formulæ for point addition are used.
KW - Differential power analysis
KW - Modular multiplication and exponentiation
KW - RSA
KW - Side channel attacks
KW - Square and multiply algorithm
UR - https://www.scopus.com/pages/publications/70350639756
U2 - 10.1007/978-3-642-04159-4_22
DO - 10.1007/978-3-642-04159-4_22
M3 - Conference proceeding
AN - SCOPUS:70350639756
SN - 3642041582
SN - 9783642041587
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 346
EP - 360
BT - Selected Areas in Cryptography - 15th International Workshop, SAC 2008, Revised Selected Papers
T2 - 15th International Workshop on Selected Areas in Cryptography, SAC 2008
Y2 - 14 August 2008 through 15 August 2008
ER -