HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS
David Tinoco Varela
Computational Science Graduate Program, Facultad de Estudios Superiores Cuautitlán,Universidad Nacional Autónoma de México, Edo. de Mex. 54740, México
ABSTRACT
Simple Power Analysis (SPA) attacks are widely used against several cryptosystems, principally against cryptosystems based on modular exponentiation. Many types of SPA have been reported in the literature, Yen et al. introduced the N-1 attack, which uses chosen input messages to obtain relevant information from the attacked cryptosystem. Their attack was implemented on the square-and-multiply always and on the BRIP algorithm, both algorithms in left-to-right form. There are possible countermeasures against this attack, but all of them are costly and time consuming. In this paper, a computationally efficient and effective method to avoid the N-1 attack is investigated.
KEYWORDS
Simple Power Analysis, N-1 Attack, Modular Exponentiation, Embedded Devices.
ORIGINAL SOURCE URL : http://airccse.org/journal/nsa/0712nsa07.pdf
No comments:
Post a Comment