Resilience of randomized RNS arithmetic with respect to side-channel leaks of cryptographic computation

Abstract : In this paper, we want to promote the influence of randomized arithmetic on the leaks during a code execution. When somebody wants to extract some specific information from these leaks, one can observe different emanations of the device like power consumption. These leaks mostly come from the variations of the Hamming distances of the successive states of the system. This phenomenon is particularly critical for cryptographic devices. Our work evaluates the resilience of randomized moduli in Residue Number System (RNS) against Correlation Power Analysis (CPA), Differential Power Analysis (DPA). Our analysis is illustrated through the evaluation of scalar multiplication on an elliptic curve using the Montgomery Powering Ladder (MPL) algorithm which protects from Simple Power Analysis (SPA). We also propose an evaluation based on the Maximum Likelihood Estimator (MLE), which crosses the information of the whole state vector, instead of analysing only the current state like with CPA or DPA. Furthermore, MLE gives better performance and smooths the results allowing a better evaluation of the behaviour of the leakage. Our experimental evaluation suggests that the number of observations, needed to perform exploitable information leakage, is proportional to the number of possible RNS bases.
Document type :
Journal articles
Complete list of metadatas

Cited literature [39 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-02174744
Contributor : Jean Claude Bajard <>
Submitted on : Friday, July 5, 2019 - 12:00:11 PM
Last modification on : Saturday, July 13, 2019 - 1:14:30 AM

Files

 Restricted access
To satisfy the distribution rights of the publisher, the document is embargoed until : 2019-12-25

Please log in to resquest access to the document

Identifiers

Citation

Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard. Resilience of randomized RNS arithmetic with respect to side-channel leaks of cryptographic computation. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2019, ⟨10.1109/TC.2019.2924630⟩. ⟨hal-02174744⟩

Share

Metrics

Record views

34