We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Dong-Guk HAN, Katsuyuki OKEYA, Tae Hyun KIM, Yoon Sung HWANG, Beomin KIM, Young-Ho PARK, "Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 5, pp. 1316-1327, May 2006, doi: 10.1093/ietfec/e89-a.5.1316.
Abstract: We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.5.1316/_p
Copy
@ARTICLE{e89-a_5_1316,
author={Dong-Guk HAN, Katsuyuki OKEYA, Tae Hyun KIM, Yoon Sung HWANG, Beomin KIM, Young-Ho PARK, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure},
year={2006},
volume={E89-A},
number={5},
pages={1316-1327},
abstract={We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.},
keywords={},
doi={10.1093/ietfec/e89-a.5.1316},
ISSN={1745-1337},
month={May},}
Copy
TY - JOUR
TI - Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1316
EP - 1327
AU - Dong-Guk HAN
AU - Katsuyuki OKEYA
AU - Tae Hyun KIM
AU - Yoon Sung HWANG
AU - Beomin KIM
AU - Young-Ho PARK
PY - 2006
DO - 10.1093/ietfec/e89-a.5.1316
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2006
AB - We propose a new analysis technique against a class of countermeasure using randomized binary signed digit (BSD) representations. We also introduce some invariant properties between BSD representations. The proposed analysis technique can directly recover the secret key from power measurements without information for algorithm because of the invariant properties of BSD representation. Thus the proposed attack is applicable to all countermeasures using BSD representations. Finally, we give the simulation results against some countermeasures using BSD representation such as Ha-Moon method, Ebeid-Hasan method, and the method of Agagliate et al. The results show that the proposed attack is practical analysis method.
ER -