International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Benoit Feix

Affiliation: UL Transaction Security

Publications

Year
Venue
Title
2014
EPRINT
2012
PKC
2011
CHES
2010
EPRINT
Horizontal Correlation Analysis on Exponentiation
Power Analysis has been widely studied since Kocher et al. presented in 1998 the initial Simple and Di fferential Power Analysis (SPA and DPA). Correlation Power Analysis (CPA) is nowadays one of the most powerful techniques which requires, as classical DPA, many execution curves for recovering secrets. We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the Big Mac attack from Walter, longer keys may facilitate this analysis and success will depend on the chip arithmetic characteristics. We present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to our attack. Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding. Also, contrarily to the Big Mac attack, it applies even in the case of regular implementations such as the square and multiply always or the Montgomery ladder. We also point out that DSA and Diffe-Hellman schemes are no longer immune against CPA. Then we discuss the efficiency of known countermeasures, and we finally present some new ones.

Program Committees

CHES 2013
CHES 2009