A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Sangyub | - |
dc.contributor.author | Cho, Sung Min | - |
dc.contributor.author | Kim, Heeseok | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-08-31T16:07:46Z | - |
dc.date.available | 2021-08-31T16:07:46Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/59008 | - |
dc.description.abstract | Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported in the literature. Since such attacks are based on detecting collisions of data dependent leakage caused by underlying long integer multiplications, so-called global shuffling countermeasure which breaks such collision correlation by independently randomizing the execution order of unit operations such as single precision multiplication and carry propagation, is considered as promising countermeasure if theoretical randomness of shuffling order is guaranteed. In this paper, we firstly analyze the practical security of the global shuffling long integer multiplications by exhibiting a combined single trace attack on software implementations on an ARM Cortex-M4 microcontroller. Our combined attack consists of a simple power analysis for revealing random permutation vectors which enables later collision-based single trace attack. First we demonstrate how to reveal random permutation vectors for carry propagation process of whole global shuffling long integer multiplications within a single power trace by simple power analysis accompanied with straightforward substitution of power consumption samples. Then we perform collision-based single trace attacks after rearranging the order of subtraces for unit carry propagations based on revealed permutation vectors. Since the vulnerability to simple power analysis is originated from the if-statement for selection of proper entries of the permutation vectors, we propose a novel countermeasure which eliminates such selection with simple addition and modulus operation and also demonstrate practical result achieving regularity in power trace patterns. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Heeseok | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1109/ACCESS.2019.2963317 | - |
dc.identifier.scopusid | 2-s2.0-85078313022 | - |
dc.identifier.wosid | 000524677500006 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp.5244 - 5255 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 5244 | - |
dc.citation.endPage | 5255 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | digital signatures | - |
dc.subject.keywordAuthor | elliptic curves | - |
dc.subject.keywordAuthor | public key | - |
dc.subject.keywordAuthor | side-channel attacks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.