An analysis of Goubin's refined power analysis attack

被引:0
|
作者
Smart, NP [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power analysis attacks on elliptic curve based systems work by analysing the point multiplication algorithm. Recently Goubin observed that if an attacker can choose the point P to enter into the point multiplication algorithm then none of the standard three randomizations can fully defend against a DPA attack. In this paper we examine Goubin's attack in more detail and completely discount its effectiveness when the attacker chooses a point of finite order, for the remaining cases we propose a defence based on using isogenies of small degree.
引用
收藏
页码:281 / 290
页数:10
相关论文
共 50 条
  • [1] A Refined Simple Power Analysis Attack on ECC with Countermeasures
    Wang, Lihui
    Li, Qing
    Zhang, Zhimin
    Shan, Weijun
    Zhang, David Wei
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 3 : 111 - 114
  • [2] A refined power-analysis attack on elliptic curve cryptosystems
    Goubin, L
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 199 - 210
  • [3] Power Analysis Attack on Implementation of DES
    Putra, Septafiansyah Dwi
    Ahmad, Adang Suwandi
    Sutikno, Sarwono
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2016,
  • [4] Power Analysis Attack on 8051 Microcontrollers
    Saravanan, P.
    Rajadurai, Nithya
    Kalpana, P.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 648 - 651
  • [5] A refined analysis on the power reactivity loss measurement in Monju
    Taninaka, Hiroshi
    Takegoshi, Atsushi
    Kishimoto, Yasufumi
    Mouri, Tetsuya
    Usami, Shin
    PROGRESS IN NUCLEAR ENERGY, 2017, 101 : 329 - 337
  • [6] Power analysis of FPGAs: How practical is the attack ?
    Standaert, RX
    Oldenzeel, LVTO
    Samyde, D
    Quisquater, JJ
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 701 - 711
  • [7] Power Side Channel Attack Analysis and Detection
    Gattu, Navyata
    Khan, Mohammad Nasim Imtiaz
    De, Asmit
    Ghosh, Swaroop
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [8] On the Attack of Misaligned Traces by Power Analysis Methods
    Tian, Qizhi
    Huss, Sorin A.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES'2012), 2012, : 28 - 34
  • [9] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,
  • [10] The impacts of the sampling resistance on the power analysis attack
    Chen, Ai-dong
    Journal of Convergence Information Technology, 2012, 7 (16) : 53 - 59