2003
DOI: 10.1007/978-3-540-45238-6_30
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Countermeasure against Address-Bit Differential Power Analysis

Abstract: Abstract. The differential power analysis (DPA) enables an adversary to reveal the secret key hidden in a smart card by observing power consumption. The address-bit DPA is a typical example of DPA which analyzes a correlation between addresses of registers and power consumption. In this paper, we propose a practical countermeasure, the randomized addressing countermeasure, against the address-bit DPA which can be applied to the exponentiation part in RSA or ECC with and without pre-computed table. Our counterm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(28 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…Based on the results presented above, we conclude that the implementation protected with coordinate randomization does not leak the intermediate point values during the scalar multiplication. However, the implementation seems to leak the key bit values; therefore, we suspect that the implementation might be susceptible to attacks similar to address-based DPA [30] or address-based template attacks [31].…”
Section: Implementation Protected With Coordinate Randomizationmentioning
confidence: 99%
“…Based on the results presented above, we conclude that the implementation protected with coordinate randomization does not leak the intermediate point values during the scalar multiplication. However, the implementation seems to leak the key bit values; therefore, we suspect that the implementation might be susceptible to attacks similar to address-based DPA [30] or address-based template attacks [31].…”
Section: Implementation Protected With Coordinate Randomizationmentioning
confidence: 99%
“…However, these do not prevent a differential SCA targeting the chain itself (as for instance the SEMD attack of [30] or the address-bit DPA [20]). To deal with this issue, we suggest to use a Boolean masking such as proposed in [21].…”
Section: Differential Side Channel Analysismentioning
confidence: 99%
“…Defences against this new form of attack have been proposed [6] that mix a random value r into the index so that the access is performed as T ki⊕r . If r is refreshed before each application of the point multiplication algorithm, the table accesses are permuted to some extent meaning that simply recovering the address of a given access does not reveal the corresponding part of the secret multiplier.…”
Section: Address-bit Dpamentioning
confidence: 99%