This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kouichi ITOH, Dai YAMAMOTO, Jun YAJIMA, Wakaha OGATA, "Collision-Based Power Attack for RSA with Small Public Exponent" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 5, pp. 897-908, May 2009, doi: 10.1587/transinf.E92.D.897.
Abstract: This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.897/_p
Copy
@ARTICLE{e92-d_5_897,
author={Kouichi ITOH, Dai YAMAMOTO, Jun YAJIMA, Wakaha OGATA, },
journal={IEICE TRANSACTIONS on Information},
title={Collision-Based Power Attack for RSA with Small Public Exponent},
year={2009},
volume={E92-D},
number={5},
pages={897-908},
abstract={This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
keywords={},
doi={10.1587/transinf.E92.D.897},
ISSN={1745-1361},
month={May},}
Copy
TY - JOUR
TI - Collision-Based Power Attack for RSA with Small Public Exponent
T2 - IEICE TRANSACTIONS on Information
SP - 897
EP - 908
AU - Kouichi ITOH
AU - Dai YAMAMOTO
AU - Jun YAJIMA
AU - Wakaha OGATA
PY - 2009
DO - 10.1587/transinf.E92.D.897
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2009
AB - This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Here, randomizing exponent techniques shows two DPA countermeasures to randomize the secret exponent d. One is an exponent randomizing technique using d'i = d+ riφ(N) to calculate cd'i (mod N), and another is a technique using di,1 =
ER -