[Resource Topic] 2015/291: Two Operands of Multipliers in Side-Channel Attack

Welcome to the resource topic for 2015/291

Title:
Two Operands of Multipliers in Side-Channel Attack

Authors: Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki

Abstract:

The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multipliers. There are two consequences. Firstly, designing order of operands can be a cost-effective countermeasure. We show a concrete example in which operand order determines success and failure of the attack. Secondly, countermeasures can be ineffective if the asymmetric leakage is considered. In addition to the main results, the attack by Hanley et al. is extended using the signal-processing technique of the big mac attack. An experimental result to successfully analyze an FPGA implementation of RSA with the multiply-always method is also presented.

ePrint: https://eprint.iacr.org/2015/291

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .