Published in

Journal of the Korea Institute of Information Security and Cryptology, 1(24), p. 261-269

DOI: 10.13089/jkiisc.2014.24.1.261

Links

Tools

Export citation

Search in Google Scholar

A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation

Journal article published in 2014 by Sung-Jun Ahn, Doo-Ho Choi, Jae-Cheol Ha
This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Question mark in circle
Preprint: policy unknown
Question mark in circle
Postprint: policy unknown
Question mark in circle
Published version: policy unknown

Abstract

There are many researches on fast exponentiation algorithm which is used to implement a public key cryptosystem such as RSA. On the other hand, the malicious attacker has tried various side-channel attacks to extract the secret key. In these attacks, an attacker uses the power consumption or electromagnetic radiation of cryptographic devices which is measured during computation of exponentiation algorithm. In this paper, we propose a novel simple power analysis attack on m-ary exponentiation implementation. The core idea of our attack on m-ary exponentiation with pre-computation process is that an attacker controls the input message to identify the power consumption patterns which are related with secret key. Furthermore, we implement the m-ary exponentiation on evaluation board and apply our simple power analysis attack to it. As a result, we verify that the secret key can be revealed in experimental environment.