[Resource Topic] 2018/009: Evaluation of Resilience of randomized RNS implementation

Welcome to the resource topic for 2018/009

Title:
Evaluation of Resilience of randomized RNS implementation

Authors: Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard

Abstract:

Randomized moduli in Residue Number System (RNS) generate effectively large noise and make quite difficult to attack a secret key K from only few observations of Hamming distances H=(H_0, ..., H_{d-1}) that result from the changes on the state variable. Since Hamming distances have gaussian distribution and most of the statistic tests, like NIST’s ones, evaluate discrete and uniform distribution, we choose to use side-channel attacks as a tool in order to evaluate randomisation of Hamming distances . This paper analyses the resilience against Correlation Power Analysis (CPA), Differential Power Analysis (DPA) when the cryptographic system is protected against Simple Power Analysis (SPA) by a Montgomery Powering Ladder (MPL). While both analysis use only information on the current state, DPA Square crosses the information of all the states. We emphasize that DPA Square performs better than DPA and CPA and we show that the number of observations S needed to perform an attack increases with respect to the number of moduli n. For Elliptic Curves Cryptography (ECC) and using a Monte Carlo simulation, we conjecture that S = O((2n)!/(n!)^2).

ePrint: https://eprint.iacr.org/2018/009

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .