An analysis of Goubin's refined power analysis attack

被引:0
|
作者
Smart, NP [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power analysis attacks on elliptic curve based systems work by analysing the point multiplication algorithm. Recently Goubin observed that if an attacker can choose the point P to enter into the point multiplication algorithm then none of the standard three randomizations can fully defend against a DPA attack. In this paper we examine Goubin's attack in more detail and completely discount its effectiveness when the attacker chooses a point of finite order, for the remaining cases we propose a defence based on using isogenies of small degree.
引用
收藏
页码:281 / 290
页数:10
相关论文
共 50 条
  • [21] Implementation of a decoupling based power analysis attack countermeasure
    Mayhew, Matthew
    Muresan, Radu
    IET CIRCUITS DEVICES & SYSTEMS, 2016, 10 (06) : 528 - 535
  • [22] Power-analysis attack on an ASIC AES implementation
    Örs, SB
    Gürkaynak, F
    Oswald, E
    Preneel, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 546 - 552
  • [23] Application of adaptive filter in correlation power analysis attack
    Zhang L.
    Fang H.
    Wang J.
    Duan X.
    Fang X.
    Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2018, 39 (02): : 108 - 115
  • [24] Enhanced Correlation Power Analysis Attack on Smart Card
    Li, Huiyun
    Wu, Keke
    Peng, Bo
    Zhang, Yiwei
    Zheng, Xinjian
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2143 - +
  • [25] Hierarchical power analysis attack for falsification detection cipher
    Yoshikawa, Masaya
    Nozaki, Yusuke
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [26] An Improved Empirical Mode Decomposition for Power Analysis Attack
    Han Gan
    Hongxin Zhang
    Muhammad Saad khan
    Xueli Wang
    Fan Zhang
    Pengfei He
    中国通信, 2017, 14 (09) : 94 - 99
  • [27] Resilience Analysis of Power Grids Under the Sequential Attack
    Zhu, Yihai
    Yan, Jun
    Tang, Yufei
    Sun, Yan
    He, Haibo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) : 2340 - 2354
  • [28] Power Analysis Attack: A Vulnerability to Smart Card Security
    Mahanta, Hridoy Jyoti
    Azad, Abul Kalam
    Khan, Ajoy Kumar
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 506 - 510
  • [29] A Chaotic Cryptographic System against Power Analysis Attack
    Luo Y.
    Li T.
    Xiao D.
    Qiu S.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 47 - 57
  • [30] Differential power analysis attack and power consumption model for cryptographic system
    Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
    Huazhong Ligong Daxue Xuebao, 2008, 6 (18-21):