Monday, September 16, 2019

HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS

HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
David Tinoco Varela
Computational Science Graduate Program, Facultad de Estudios Superiores Cuautitlán,Universidad Nacional Autónoma de México, Edo. de Mex. 54740, México

ABSTRACT

Simple Power Analysis (SPA) attacks are widely used against several cryptosystems, principally against cryptosystems based on modular exponentiation. Many types of SPA have been reported in the literature, Yen et al. introduced the N-1 attack, which uses chosen input messages to obtain relevant information from the attacked cryptosystem. Their attack was implemented on the square-and-multiply always and on the BRIP algorithm, both algorithms in left-to-right form. There are possible countermeasures against this attack, but all of them are costly and time consuming. In this paper, a computationally efficient and effective method to avoid the N-1 attack is investigated.

KEYWORDS

Simple Power Analysis, N-1 Attack, Modular Exponentiation, Embedded Devices. 




No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...