Vertical and horizontal correlation attacks on RNS-based exponentiations

Guilherme Perin 1 Laurent Imbert 2 Philippe Maurine 1 Lionel Torres 1
1 SysMIC - Conception et Test de Systèmes MICroélectroniques
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
2 ECO - Exact Computing
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Side-channel attacks are a serious threat for physical implementations of public-key cryptosystems and notably for the RSA. Side-channel leakages can be explored from unprotected cryptodevices and several power or electromagnetic traces are collected in order to construct (vertical) differential side-channel attacks. On exponentiations, the so-called horizontal correlation attacks originally proposed by Walter in 2001 and improved by Clavier et al in 2010 demonstrated to be efficient even in the presence of strong countermeasures like the exponent and message blinding. In particular, a single trace is sufficient to recover the secret if the modular exponentiation features long-integer multiplications. In this paper, we consider the application of vertical and horizontal correlation attacks on RNS-based approaches. The Montgomery multiplication, which is widely adopted in the finite ring of an exponentiation, has different construction details in the RNS domain. Experiments are conducted on hardware (parallel) and software (sequential) and leakage models for known and masked inputs are constructed for the regular and SPA-protected Montgomery ladder algorithm.
Type de document :
Article dans une revue
Journal of Cryptographic Engineering, Springer, 2015, 5 (3), pp.171-185. 〈10.1007/s13389-015-0095-0〉
Liste complète des métadonnées

Littérature citée [34 références]  Voir  Masquer  Télécharger

https://hal-lirmm.ccsd.cnrs.fr/lirmm-01269799
Contributeur : Philippe Maurine <>
Soumis le : vendredi 5 février 2016 - 12:03:27
Dernière modification le : samedi 25 novembre 2017 - 10:16:14
Document(s) archivé(s) le : samedi 12 novembre 2016 - 11:17:58

Fichier

paper_JCE_v4_revised.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres. Vertical and horizontal correlation attacks on RNS-based exponentiations. Journal of Cryptographic Engineering, Springer, 2015, 5 (3), pp.171-185. 〈10.1007/s13389-015-0095-0〉. 〈lirmm-01269799〉

Partager

Métriques

Consultations de la notice

165

Téléchargements de fichiers

487