Simple power analysis attack against cryptosystems based on Montgomery algorithm

The Montgomery algorithm is widely used to reduce the computational complexity of large integer modular exponentiation. The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulne...

Full description

Saved in:
Bibliographic Details
Main Authors: Gang GAN, Min WANG, Zhi-bo DU, Zhen WU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.020/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539783928578048
author Gang GAN
Min WANG
Zhi-bo DU
Zhen WU
author_facet Gang GAN
Min WANG
Zhi-bo DU
Zhen WU
author_sort Gang GAN
collection DOAJ
description The Montgomery algorithm is widely used to reduce the computational complexity of large integer modular exponentiation. The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive informa-tion leakage could be used by side-channel attack. The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. The results show that the attack algorithm is correct and effective.
format Article
id doaj-art-0b4a83aed9d743ad9e6d31b5f5323f7a
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-0b4a83aed9d743ad9e6d31b5f5323f7a2025-01-14T06:41:55ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-013415616159677249Simple power analysis attack against cryptosystems based on Montgomery algorithmGang GANMin WANGZhi-bo DUZhen WUThe Montgomery algorithm is widely used to reduce the computational complexity of large integer modular exponentiation. The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive informa-tion leakage could be used by side-channel attack. The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. The results show that the attack algorithm is correct and effective.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.020/modular exponentiationside-channel attacksimple power analysisMontgomery algorithm
spellingShingle Gang GAN
Min WANG
Zhi-bo DU
Zhen WU
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Tongxin xuebao
modular exponentiation
side-channel attack
simple power analysis
Montgomery algorithm
title Simple power analysis attack against cryptosystems based on Montgomery algorithm
title_full Simple power analysis attack against cryptosystems based on Montgomery algorithm
title_fullStr Simple power analysis attack against cryptosystems based on Montgomery algorithm
title_full_unstemmed Simple power analysis attack against cryptosystems based on Montgomery algorithm
title_short Simple power analysis attack against cryptosystems based on Montgomery algorithm
title_sort simple power analysis attack against cryptosystems based on montgomery algorithm
topic modular exponentiation
side-channel attack
simple power analysis
Montgomery algorithm
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.020/
work_keys_str_mv AT ganggan simplepoweranalysisattackagainstcryptosystemsbasedonmontgomeryalgorithm
AT minwang simplepoweranalysisattackagainstcryptosystemsbasedonmontgomeryalgorithm
AT zhibodu simplepoweranalysisattackagainstcryptosystemsbasedonmontgomeryalgorithm
AT zhenwu simplepoweranalysisattackagainstcryptosystemsbasedonmontgomeryalgorithm