Abstract
In cryptographic devices like a smart card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. However, the issue of efficiency sometimes raises vulnerabilities against side channel attacks (SCAs). In elliptic curve cryptosystems, one of main operations is the scalar multiplication. Thus it must be constructed in safety against SCAs. Recently, Hedabou et al. proposed a signed-all-bits set (sABS) recoding as simple power analysis countermeasure, which is also secure against doubling attack (DA). In this paper we propose enhanced doubling attacks which break Hedabou’s countermeasure based on sABS recoding, and then show the statistical approach of noise reduction to experiment on the proposed attacks in actuality. We also introduce a countermeasure based on a projective coordinate.
Keywords
Download to read the full chapter text
Chapter PDF
References
ANSI X9.62, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA) (1999)
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Clavier, C., Joye, M.: Universal Exponentiation Algorithm. A First Step towards Provable SPA-Resistance. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 300–308. Springer, Heidelberg (2001)
Coron, J.S.: Resistance against differential power analysis for Elliptic Curve Cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292–302. Springer, Heidelberg (1999)
Fouque, P.A., Valette, F.: The Doubling Attack. Why Upwards Is Better than Downwards. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269–280. Springer, Heidelberg (2003)
Goubin, L.: A refined power analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199–211. Springer, Heidelberg (2002)
Hedabou, M., Pinel, P., Bebeteau, L.: Countermeasures for Preventing Comb Method Against SCA Attacks. In: Deng, R.H., et al. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 85–96. Springer, Heidelberg (2005)
ISO/IEC 15946-4, Information technology - Security techniques. Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message recovery. Working Draft, JTC 1/SC 27 (December 28th, 2001)
Koblitz, N.: Elliptic curve crypto- systems. Math. of Computation 48, 203–209 (1987)
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks (1998), http://www.cryptography.com/dpa/technical
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures Against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 343–356. Springer, Heidelberg (2004)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
National Institute of Standards and Technology (NIST), Recommended Elliptic Curves for Federal Government Use. In the appendix of FIPS 186-2, available from http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM 21(2), 120–126 (1978)
Standards for Efficient Cryptography Group (SECG), Specification of Standards for Efficient Cryptography, Ver. 1.0 (2000), Available from http://www.secg.org/secgdocs.htm
Tiu, C.C.: A New Frequency-Based Side Channel Attack forEmbedded Systems. Master’s thesis, University of Waterloo (2005)
Wireless Application Protocol (WAP) Forum, Wireless Transport Layer Security (WTLS) Specification. Available from http://www.wapforum.org
Yen, S.-M., et al.: A Countermeasure against One Physical Cryptanalysis Benefit Another Attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kim, H., Kim, T.H., Ryoo, J.C., Han, DG., Kim, H.W., Lim, J. (2007). Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, JJ. (eds) Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. WISTP 2007. Lecture Notes in Computer Science, vol 4462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72354-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-72354-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72353-0
Online ISBN: 978-3-540-72354-7
eBook Packages: Computer ScienceComputer Science (R0)