Skip to main content
Top
Published in: World Wide Web 1/2018

29-03-2017

Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure

Authors: Hui Wang, Wei Guo, Jizeng Wei

Published in: World Wide Web | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The chosen-message method is used to be employed in conducting Simple Power Analysis (SPA) attack by means of selecting special input messages. However, it is difficult to make distinction by visual observation i.e., SPA in practical IoT hardware environment. In this paper, we proposed a practical chosen-message correlation power analysis (CPA) attack which combines the chosen-message method with CPA for side channel attack. Then, we adopt other two practical chosen-messages, 1 and n + 1, to attack Boscher’s right-to-left binary exponentiation algorithm which is wildly considered as an efficient side channel resistant algorithm. Finally, this paper presents a countermeasure to resist the chosen-message CPA attack over Boscher’s algorithm without nullifying its countermeasure features to Differential Power Analysis (DPA) and Differential Fault Analysis (DFA). To validate the proposed attack method and countermeasure, a 1024-bit RSA coprocessor is constructed on the Xilinx Virtex-5 with the Side-channel Attack Standard Evaluation Board (SASEBO) to implement Boscher’s algorithm as well as our proposed algorithm and launched the proposed attack on it separately. The experiment results show that the proposed attack and countermeasure are feasible and efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aidong, C., Sen, X., Yun, C., Zhiguang, Q.: Collision-based chosen-message simple power clustering attack algorithm. China Communications. 10(5), 114–119 (2013)CrossRef Aidong, C., Sen, X., Yun, C., Zhiguang, Q.: Collision-based chosen-message simple power clustering attack algorithm. China Communications. 10(5), 114–119 (2013)CrossRef
2.
go back to reference Amiel, F., Feix, B.: On the brip algorithms security for rsa. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIPWG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13–16, 2008. Proceedings, pp. 136–149. Berlin (2008) Amiel, F., Feix, B.: On the brip algorithms security for rsa. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIPWG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13–16, 2008. Proceedings, pp. 136–149. Berlin (2008)
3.
go back to reference Amiel, F., Feix, B., Villegas, K.: Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. In: Selected Areas in Cryptography: 14th International Workshop, SAC 2007, pp. 110–125. Berlin (2007) Amiel, F., Feix, B., Villegas, K.: Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. In: Selected Areas in Cryptography: 14th International Workshop, SAC 2007, pp. 110–125. Berlin (2007)
4.
go back to reference Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: proceedings of the 2009 workshop on fault diagnosis and tolerance in cryptography, FDTC ‘09, pp. 3–9. IEEE Computer Society, Washington, DC (2009)CrossRef Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: proceedings of the 2009 workshop on fault diagnosis and tolerance in cryptography, FDTC ‘09, pp. 3–9. IEEE Computer Society, Washington, DC (2009)CrossRef
5.
go back to reference Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Cryptographic Hardware and Embedded Systems – CHES 2004: 6th International Workshop Cambridge, pp. 16–29. Berlin (2004) Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Cryptographic Hardware and Embedded Systems – CHES 2004: 6th International Workshop Cambridge, pp. 16–29. Berlin (2004)
6.
go back to reference Clavier, C., Feix, B.: Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis. In: Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, COSADE 2013, Paris, France, March 6–8, 2013, Revised Selected Papers, pp. 80–98. Berlin (2013) Clavier, C., Feix, B.: Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis. In: Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, COSADE 2013, Paris, France, March 6–8, 2013, Revised Selected Papers, pp. 80–98. Berlin (2013)
7.
go back to reference Courrege, J.C., Feix, B., Roussellet, M.: Simple Power Analysis on Exponentiation Revisited. In: Smart Card Research and Advanced Application: 9th IFIPWG 8.8/11.2 International Conference, CARDIS 2010, pp. 65–79. Berlin (2010) Courrege, J.C., Feix, B., Roussellet, M.: Simple Power Analysis on Exponentiation Revisited. In: Smart Card Research and Advanced Application: 9th IFIPWG 8.8/11.2 International Conference, CARDIS 2010, pp. 65–79. Berlin (2010)
8.
go back to reference Ding, Z., Guo, W., Su, L., Wei, J., Gu, H.: Further research on N-1 attack against exponentiation algorithms, pp. 162–175. Springer International Publishing, Cham (2014)MATH Ding, Z., Guo, W., Su, L., Wei, J., Gu, H.: Further research on N-1 attack against exponentiation algorithms, pp. 162–175. Springer International Publishing, Cham (2014)MATH
9.
go back to reference Fumaroli, G., Vigilant, D.: Blinded Fault Resistant Exponentiation. In: Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings, pp. 62–70. Berlin (2006) Fumaroli, G., Vigilant, D.: Blinded Fault Resistant Exponentiation. In: Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings, pp. 62–70. Berlin (2006)
10.
go back to reference Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Samir, A.: Comparative power analysis of modular exponentiation algorithms. IEEE Trans. Comput. 59(6), 795–807 (2010)MathSciNetCrossRefMATH Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Samir, A.: Comparative power analysis of modular exponentiation algorithms. IEEE Trans. Comput. 59(6), 795–807 (2010)MathSciNetCrossRefMATH
11.
go back to reference Kim, C.H., Quisquater, J.J.: How Can We Overcome Both Side Channel Analysis and Fault Attacks on RSA-CRT? In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC ‘07, pp. 21–29. IEEE Computer Society, Washington, DC (2007) Kim, C.H., Quisquater, J.J.: How Can We Overcome Both Side Channel Analysis and Fault Attacks on RSA-CRT? In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC ‘07, pp. 21–29. IEEE Computer Society, Washington, DC (2007)
12.
go back to reference Kim, H., Kim, T., Yoon, J., Hong, S.: Practical second-order correlation power analysis on the message blinding method and its novel countermeasure for RSA. ETRI J. 32(1), 102–111 (2010)CrossRef Kim, H., Kim, T., Yoon, J., Hong, S.: Practical second-order correlation power analysis on the message blinding method and its novel countermeasure for RSA. ETRI J. 32(1), 102–111 (2010)CrossRef
13.
go back to reference Kocher, P.C.: Timing Attacks on Implementations of Di_e-Hellman, RSA, DSS, and Other Systems. In: Advances in Cryptology | CRYPTO ‘96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings, pp. 104–113. Berlin (1996) Kocher, P.C.: Timing Attacks on Implementations of Di_e-Hellman, RSA, DSS, and Other Systems. In: Advances in Cryptology | CRYPTO ‘96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18–22, 1996 Proceedings, pp. 104–113. Berlin (1996)
14.
go back to reference Kocher, P.C., Ja_e, J., Jun, B.: Differential Power Analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ‘99, pp. 388–397. Springer-Verlag, London (1999) Kocher, P.C., Ja_e, J., Jun, B.: Differential Power Analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ‘99, pp. 388–397. Springer-Verlag, London (1999)
15.
go back to reference Kuzu, E.A., Soysal, B., Sahiinoglu, M., Guven_c, U., Tangel, A.: New Cross Correlation Attack Methods on the Montgomery Ladder Implementation of RSA. In: Advance Computing Conference (IACC), 2013 I.E. 3rd International, pp. 138–142 (2013) Kuzu, E.A., Soysal, B., Sahiinoglu, M., Guven_c, U., Tangel, A.: New Cross Correlation Attack Methods on the Montgomery Ladder Implementation of RSA. In: Advance Computing Conference (IACC), 2013 I.E. 3rd International, pp. 138–142 (2013)
16.
go back to reference Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures against RPA, DPA, and SPA. In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11–13, 2004. Proceedings, pp. 343–356. Berlin (2004) Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures against RPA, DPA, and SPA. In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11–13, 2004. Proceedings, pp. 343–356. Berlin (2004)
17.
go back to reference Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: C.K. Koc, C. Paar (eds.) Cryptographic Hardware and Embedded Systems: First International Workshop, CHES‘99 Worcester, MA, USA, August 12–13, 1999. Proceedings, pp. 144–157. Berlin, Heidelberg (1999) Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: C.K. Koc, C. Paar (eds.) Cryptographic Hardware and Embedded Systems: First International Workshop, CHES‘99 Worcester, MA, USA, August 12–13, 1999. Proceedings, pp. 144–157. Berlin, Heidelberg (1999)
18.
go back to reference Miyamoto, A., Homma, N., Aoki, T., Satoh, A.: Enhanced Power Analysis Attack Using Chosen Message Against RSA Hardware Implementations. In: 2008 I.E. International Symposium on Circuits and Systems, pp. 3282–3285 (2008) Miyamoto, A., Homma, N., Aoki, T., Satoh, A.: Enhanced Power Analysis Attack Using Chosen Message Against RSA Hardware Implementations. In: 2008 I.E. International Symposium on Circuits and Systems, pp. 3282–3285 (2008)
19.
go back to reference Miyamoto, A., Homma, N., Aoki, T., Satoh, A.: Systematic design of RSA processors based on high-radix Montgomery multipliers. IEEE Trans. Very Large Scale Integr. VLSI Syst. 19(7), 1136–1146 (2011)CrossRef Miyamoto, A., Homma, N., Aoki, T., Satoh, A.: Systematic design of RSA processors based on high-radix Montgomery multipliers. IEEE Trans. Very Large Scale Integr. VLSI Syst. 19(7), 1136–1146 (2011)CrossRef
20.
go back to reference Pearson, K.: Note on regression and inheritance in the case of two parents. Proc. R. Soc. Lond. 58, 240–242 (1895)CrossRef Pearson, K.: Note on regression and inheritance in the case of two parents. Proc. R. Soc. Lond. 58, 240–242 (1895)CrossRef
21.
go back to reference Repka, M., Varchola, M.: Correlation power analysis using measured and simulated power traces based on hamming distance power model - attacking 16-bit integer multiplier in FPGA. International Journal of Computer Network and Information Security. 7(6), 10–16 (2015)CrossRef Repka, M., Varchola, M.: Correlation power analysis using measured and simulated power traces based on hamming distance power model - attacking 16-bit integer multiplier in FPGA. International Journal of Computer Network and Information Security. 7(6), 10–16 (2015)CrossRef
22.
go back to reference Wan, W., Yang, W., Chen, J.: An optimized cross correlation power attack of message blinding exponentiation algorithms. China Communications. 12(6), 22–32 (2015)CrossRef Wan, W., Yang, W., Chen, J.: An optimized cross correlation power attack of message blinding exponentiation algorithms. China Communications. 12(6), 22–32 (2015)CrossRef
23.
go back to reference Witteman, M.F., van Woudenberg, J.G.J., Menarini, F.: Defeating RSA Multiply-Always and Message Blinding Countermeasures. In: Topics in Cryptology - CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings, pp. 77–88. Berlin (2011) Witteman, M.F., van Woudenberg, J.G.J., Menarini, F.: Defeating RSA Multiply-Always and Message Blinding Countermeasures. In: Topics in Cryptology - CT-RSA 2011: The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings, pp. 77–88. Berlin (2011)
24.
go back to reference Yen, S.M., Lien, W.C., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Progress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia, pp. 183–195. Berlin (2005) Yen, S.M., Lien, W.C., Moon, S., Ha, J.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. In: Progress in Cryptology - Mycrypt 2005: First International Conference on Cryptology in Malaysia, pp. 183–195. Berlin (2005)
Metadata
Title
Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
Authors
Hui Wang
Wei Guo
Jizeng Wei
Publication date
29-03-2017
Publisher
Springer US
Published in
World Wide Web / Issue 1/2018
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0442-4

Other articles of this Issue 1/2018

World Wide Web 1/2018 Go to the issue

Premium Partner