검색 상세

Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA

초록/요약

Until recently, power analysis is one of the most popular research issues among various side channel analyses. Since Differential Power Analysis had been first proposed by Kocher et al., various practical power analyses correspond with software/hardware cryptographic devices have been proposed. In this paper, we analyze vulnerability of countermeasure against power analysis exploiting single power trace of public cryptographic algorithm. In ICICS 2010, Clavier et al. proposed Horizontal Correlation Analysis which can recover secret information from a single exponentiation trace and corresponding countermeasures. "Blind operands in LIM", one of their countermeasures, exploits additive blinding in order to prevent leakage of intermediate value related to secret information. However, this countermeasure has vulnerability of having power leakage that is dependant with the message known by an adversary. In this paper, we analyzed vulnerabilities by three attack scenarios and proved them by practical correlation power analysis experiments.

more

목차

1 Introduction 1
1.1 Motivation 1
2 Exponentiation algorithm implementation and Horizontal Correlation Analysis 4
2.1 Modular Exponentiation algorithm and Long Integer Multiplication 4
2.2 Horizontal Correlation Analysis and their Countermeasures[7] 7
3 Analysis on Vulnerabilities of Countermeasure against Horizontal Correlation Analysis 14
3.1 Analysis of Vulnerabilities 14
3.2 Scenarios to Perform Horizontal Correlation Analysis 17
4 Experimental Results 21
4.1 Experiment Environment 21
4.2 Analysis of Power Traces 24
4.3 Vertical Correlation Analysis 27
4.4 Horizontal Correlation Analysis 32
5 Countermeasures 38
6 Conclusion 40

more