Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order

この論文にアクセスする

この論文をさがす

著者

    • YEN Sung-Ming
    • Dept of Computer Science and Information Engineering, National Central University
    • LIEN Wei-Chih
    • Dept of Computer Science and Information Engineering, National Central University
    • CHEN Chien-Ning
    • Dept of Computer Science and Information Engineering, National Central University

抄録

Power analysis can be used to attack many implementations of cryptosystems, e.g., RSA and ECC, and the doubling attack is a collision based power analysis performed on two chosen ciphertexts. In this paper, we introduced a modified doubling attack to threaten RSA and ECC implementations by exploiting only one chosen ciphertext of small order. To attack the RSA implementations we selected an input of order two while to attack the ECC implementations we exploited one chosen invalid point of small order on a cryptographically weak curve rather than on the original curve. We showed that several existing power analysis countermeasures for RSA and ECC implementations are still vulnerable to the proposed attack. To prevent the proposed attack, we suggested countermeasures for RSA as well as for ECC.

収録刊行物

  • IEICE transactions on fundamentals of electronics, communications and computer sciences

    IEICE transactions on fundamentals of electronics, communications and computer sciences 94(10), 1981-1990, 2011-10-01

    一般社団法人 電子情報通信学会

参考文献:  29件中 1-29件 を表示

各種コード

  • NII論文ID(NAID)
    10030191198
  • NII書誌ID(NCID)
    AA10826239
  • 本文言語コード
    ENG
  • 資料種別
    ART
  • ISSN
    09168508
  • データ提供元
    CJP書誌  J-STAGE 
ページトップへ