Skip to main navigation Skip to search Skip to main content

Distinguishing multiplications from squaring operations

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

In this paper we present a new approach to attacking a modular exponentiation and scalar multiplication based by distinguishing multiplications from squaring operations using the instantaneous power consumption. Previous approaches have been able to distinguish these operations based on information of the specific implementation of the embedded algorithm or the relationship between specific plaintexts. The proposed attack exploits the expected Hamming weight of the result of the computed operations. We extrapolate our observations and assess the consequences for elliptic curve cryptosystems when unified formulæ for point addition are used.

Original languageEnglish
Title of host publicationSelected Areas in Cryptography - 15th International Workshop, SAC 2008, Revised Selected Papers
Pages346-360
Number of pages15
DOIs
Publication statusPublished - 2008
Event15th International Workshop on Selected Areas in Cryptography, SAC 2008 - Sackville, NB, Canada
Duration: 14 Aug 200815 Aug 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5381 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Workshop on Selected Areas in Cryptography, SAC 2008
Country/TerritoryCanada
CitySackville, NB
Period14/08/0815/08/08

Keywords

  • Differential power analysis
  • Modular multiplication and exponentiation
  • RSA
  • Side channel attacks
  • Square and multiply algorithm

Fingerprint

Dive into the research topics of 'Distinguishing multiplications from squaring operations'. Together they form a unique fingerprint.

Cite this