Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA

Full metadata record
DC Field Value Language
dc.contributor.authorKim, HeeSeok-
dc.contributor.authorKim, Tae Hyun-
dc.contributor.authorYoon, Joong Chul-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-08T05:20:42Z-
dc.date.available2021-09-08T05:20:42Z-
dc.date.created2021-06-11-
dc.date.issued2010-02-
dc.identifier.issn1225-6463-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/117051-
dc.description.abstractRecently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-random-initial-point algorithm on elliptical curve cryptosystems. It is known to be secure against first-order differential power analysis (DPA); however, it is susceptible to second-order DPA. Although second-order DPA gives some solutions for defeating message blinding methods, this kind of attack still has the practical difficulty of how to find the points of interest, that is, the exact moments when intermediate values are being manipulated. In this paper, we propose a practical second-order correlation power analysis (SOCPA). Our attack can easily find points of interest in a power trace and find the private key with a small number of power traces. We also propose an efficient countermeasure which is secure against the proposed SOCPA as well as existing power attacks.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.subjectDPA-
dc.subjectATTACKS-
dc.titlePractical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, HeeSeok-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.4218/etrij.10.0109.0249-
dc.identifier.scopusid2-s2.0-77249121660-
dc.identifier.wosid000274705000012-
dc.identifier.bibliographicCitationETRI JOURNAL, v.32, no.1, pp.102 - 111-
dc.relation.isPartOfETRI JOURNAL-
dc.citation.titleETRI JOURNAL-
dc.citation.volume32-
dc.citation.number1-
dc.citation.startPage102-
dc.citation.endPage111-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001418702-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusDPA-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordAuthorRSA cryptosystems-
dc.subject.keywordAuthorside channel attacks-
dc.subject.keywordAuthormessage blinding method-
dc.subject.keywordAuthorBRIP-
dc.subject.keywordAuthorsecond-order DPA-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE