Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA
- 주제(키워드) side-channel power analysis , horizontal correlation analysis , long integer multiplication , additive operand blinding countermeasure
- 발행기관 고려대학교 정보보호대학원
- 지도교수 홍석희
- 발행년도 2015
- 학위수여년월 2015. 8
- 학위구분 석사
- 학과 정보보호대학원 정보보호학과
- 원문페이지 49 p
- 실제URI http://www.dcollection.net/handler/korea/000000060135
- 본문언어 영어
- 제출원본 000045841250
초록/요약
Until recently, power analysis is one of the most popular research issues among various side channel analyses. Since Differential Power Analysis had been first proposed by Kocher et al., various practical power analyses correspond with software/hardware cryptographic devices have been proposed. In this paper, we analyze vulnerability of countermeasure against power analysis exploiting single power trace of public cryptographic algorithm. In ICICS 2010, Clavier et al. proposed Horizontal Correlation Analysis which can recover secret information from a single exponentiation trace and corresponding countermeasures. "Blind operands in LIM", one of their countermeasures, exploits additive blinding in order to prevent leakage of intermediate value related to secret information. However, this countermeasure has vulnerability of having power leakage that is dependant with the message known by an adversary. In this paper, we analyzed vulnerabilities by three attack scenarios and proved them by practical correlation power analysis experiments.
more목차
1 Introduction 1
1.1 Motivation 1
2 Exponentiation algorithm implementation and Horizontal Correlation Analysis 4
2.1 Modular Exponentiation algorithm and Long Integer Multiplication 4
2.2 Horizontal Correlation Analysis and their Countermeasures[7] 7
3 Analysis on Vulnerabilities of Countermeasure against Horizontal Correlation Analysis 14
3.1 Analysis of Vulnerabilities 14
3.2 Scenarios to Perform Horizontal Correlation Analysis 17
4 Experimental Results 21
4.1 Experiment Environment 21
4.2 Analysis of Power Traces 24
4.3 Vertical Correlation Analysis 27
4.4 Horizontal Correlation Analysis 32
5 Countermeasures 38
6 Conclusion 40

