Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, HeeSeok | - |
dc.contributor.author | Kim, Tae Hyun | - |
dc.contributor.author | Yoon, Joong Chul | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-08T05:20:42Z | - |
dc.date.available | 2021-09-08T05:20:42Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2010-02 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/117051 | - |
dc.description.abstract | Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-random-initial-point algorithm on elliptical curve cryptosystems. It is known to be secure against first-order differential power analysis (DPA); however, it is susceptible to second-order DPA. Although second-order DPA gives some solutions for defeating message blinding methods, this kind of attack still has the practical difficulty of how to find the points of interest, that is, the exact moments when intermediate values are being manipulated. In this paper, we propose a practical second-order correlation power analysis (SOCPA). Our attack can easily find points of interest in a power trace and find the private key with a small number of power traces. We also propose an efficient countermeasure which is secure against the proposed SOCPA as well as existing power attacks. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.subject | DPA | - |
dc.subject | ATTACKS | - |
dc.title | Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, HeeSeok | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.4218/etrij.10.0109.0249 | - |
dc.identifier.scopusid | 2-s2.0-77249121660 | - |
dc.identifier.wosid | 000274705000012 | - |
dc.identifier.bibliographicCitation | ETRI JOURNAL, v.32, no.1, pp.102 - 111 | - |
dc.relation.isPartOf | ETRI JOURNAL | - |
dc.citation.title | ETRI JOURNAL | - |
dc.citation.volume | 32 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 102 | - |
dc.citation.endPage | 111 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001418702 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | DPA | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordAuthor | RSA cryptosystems | - |
dc.subject.keywordAuthor | side channel attacks | - |
dc.subject.keywordAuthor | message blinding method | - |
dc.subject.keywordAuthor | BRIP | - |
dc.subject.keywordAuthor | second-order DPA | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.