An analysis of Goubin's refined power analysis attack

被引:0
|
作者
Smart, NP [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power analysis attacks on elliptic curve based systems work by analysing the point multiplication algorithm. Recently Goubin observed that if an attacker can choose the point P to enter into the point multiplication algorithm then none of the standard three randomizations can fully defend against a DPA attack. In this paper we examine Goubin's attack in more detail and completely discount its effectiveness when the attacker chooses a point of finite order, for the remaining cases we propose a defence based on using isogenies of small degree.
引用
收藏
页码:281 / 290
页数:10
相关论文
共 50 条
  • [41] Power Analysis: Simplified Template Attack on Exclusive Disjunction Operation
    Kostromin, Igor
    Kurapov, Peter
    Pogibelskiy, Dmitry
    2017 FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND TELECOMMUNICATION (EN&T), 2017, : 7 - 10
  • [42] Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher
    Palma, Kenneth
    Moll, Francesc
    PROCEEDINGS OF THE 37TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS 2022), 2022, : 191 - 196
  • [43] Path analysis attack prediction method for electric power CPS
    Xia Z.
    Li W.
    Jiang L.
    Xu M.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2018, 58 (02): : 157 - 163
  • [44] A Chaotic Block Cryptographic System Resistant to Power Analysis Attack
    Luo, Yuling
    Zhang, Dezheng
    Liu, Junxiu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (08):
  • [45] An Energy Trace Compression Method for Differential Power Analysis Attack
    Cai, Xiaomin
    Li, Renfa
    Kuang, Shijie
    Tan, Jinhui
    IEEE ACCESS, 2020, 8 : 89084 - 89092
  • [46] An Efficient Hardware Countermeasure against Differential Power Analysis Attack
    Choudhury, Amlan Jyoti
    Park, Beum Su
    Bruce, Ndibanje
    Lee, Young Sil
    Lim, Hyotaek
    Lee, Hoon Jae
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 153 - +
  • [47] A Correlation Power Analysis Attack against Tate Pairing on FPGA
    Pan, Weibo
    Marnane, William P.
    RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS, 2011, 6578 : 340 - 349
  • [48] Power Analysis Attack for an Authenticated Encryption Offset Two Round
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 521 - 526
  • [49] Differential Power Analysis Attack on SIMON and LED Block Ciphers
    Shanmugam, Dillibabu
    Selvam, Ravikumar
    Annadurai, Suganya
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 110 - 125
  • [50] Network Attack Analysis of an Indoor Power Line Communication Network
    Uwaezuoke, Emmanuel C.
    Swart, Theo G.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS (ISPLC), 2021, : 96 - 101