首页> 外文会议>Applied Cryptography and Network Security >Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits
【24h】

Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits

机译:使用随机二进制符号数字对策的密码学分析

获取原文

摘要

Recently, side channel attacks (SCA) have been recognized as menaces to public key cryptosystems. In SCA, an attacker observes side channel information during cryptographic operations, and reveals the secret scalar using the side channel information. On the other hand, elliptic curve cryptosystems (ECC) are suitable for implementing on smartcards. Since a scalar multiplication is a dominant step in ECC, we need to design an algorithm to compute scalar multiplication with the immunity to SCA. For this purpose, several scalar multiplication methods that utilize randomized binary-signed-digit (BSD) representations were proposed. This type of countermeasures includes Ha-Moon's countermeasure, Ebeid-Hasan's one, and Agagliate's one. In this paper we propose a novel general attack against "all" the countermeasures of this type. The proposed attack lists the candidates for the secret scalar, however straight-forward approach requires huge memory, thus it is in-feasible. The proposed attack divides the table into small tables, which reduces the memory requirement. For example, the computational cost and the memory requirement of the proposed attack for revealing the 163-bit secret key are O(2~8) and O(2~(23)), respectively, using 20 observations on the scalar multiplication with Ha-Moon's countermeasure. The computational cost and the memory requirement are O(2~(21)) and O(2~(12)) for Ebeid-Hasan's one, and O(2~(40)) and O(2~6) for Agagliate's one. If 40 observations are used, computational cost for Agagliate's one is reduced to O(2~(33)). Whenever we utilize a countermeasure of BSD type, we should beware of the proposed attack. In other words, the security of BSD type is controversial.
机译:近来,侧信道攻击(SCA)已被公认为对公钥密码系统的威胁。在SCA中,攻击者会在加密操作期间观察辅助信道信息,并使用辅助信道信息来揭示秘密标量。另一方面,椭圆曲线密码系统(ECC)适用于在智能卡上实现。由于标量乘法是ECC中的主要步骤,因此我们需要设计一种算法来计算具有SCA免疫力的标量乘法。为此,提出了几种利用随机二进制符号数字(BSD)表示的标量乘法方法。这种对策包括Ha-Moon的对策,Ebeid-Hasan的对策和Agagliate的对策。在本文中,我们提出了一种针对“所有”此类对策的新颖的一般性攻击。拟议的攻击列出了秘密标量的候选者,但是直接方法需要巨大的内存,因此这是不可行的。拟议的攻击将表分成小表,从而减少了内存需求。例如,使用Ha的标量乘积的20个观测值,提出的用于揭示163位密钥的攻击的计算成本和存储要求分别为O(2〜8)和O(2〜(23))。 -月亮的对策。对于Ebeid-Hasan而言,计算成本和内存需求分别为O(2〜(21))和O(2〜(12)),对Agagliate而言,其计算成本为O(2〜(40))和O(2〜6)。 。如果使用40个观测值,则Agagliate观测值的计算成本将降低为O(2〜(33))。每当我们使用BSD类型的对策时,都应该提防建议的攻击。换句话说,BSD类型的安全性是有争议的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号