首页> 外文会议>International Workshop on Cryptographic Hardware and Embedded Systems >The Carry Leakage on the Randomized Exponent Countermeasure
【24h】

The Carry Leakage on the Randomized Exponent Countermeasure

机译:随机指数对策进行泄漏

获取原文

摘要

In this paper, we describe a new attack against a classical differential power analysis resistant countermeasure in public key implementations. This countermeasure has been suggested by Coron since 1999 and is known as the exponent randomization. Here, we show that even though the binary exponentiation, or the scalar product on elliptic curves implementation, does not leak information on the secret key, the computation of the randomized secret exponent, or scalar, can leak useful information for an attacker. Such part of the algorithm can be not well-protected since its goal is to avoid attack during the exponentiation. Consequently, our attack can be mounted against any kind of exponentiation, even very resistant as soon as the exponent randomization countermeasure is used. We target an e-bit adder which adds e-bit words of the secret exponent and of a random value. We show that if the carry leaks during the addition, then we can almost learn the high order bits of each word of the secret exponent. Finally, such information can be then used to recover the entire secret key of RSA or ECC based cryptosystems.
机译:在本文中,我们描述了对公共关键实施中经典差分功率分析抗衡对策的新攻击。自1999年以来,Coron提出了这一对策,被称为指数随机化。在这里,我们表明即使二进制指数或椭圆曲线实现上的标量产品不泄露关于秘密密钥的信息,随机秘密指数或标量的计算可以泄漏攻击者的有用信息。由于其目标是避免在指数期间避免攻击,因此这些算法的这些部分可能是不受欢迎的。因此,我们的攻击可以安装在使用指数随机化对策后,即使在使用指数随机化对策时也可以抵抗任何一种指数。我们针对一个e-bit加法器,它会增加秘密指数的e-bit词和随机值。我们表明,如果在此过程中携带泄漏,那么我们几乎可以学习秘密指数的每个单词的高阶位。最后,可以使用这些信息来恢复基于RSA或ECC的密码系统的整个秘密密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号