Distinguishing Multiplications from Squaring Operations
Frederic Amiel Benoit Feix Michael Tunstall Claire Whelan William P. Marnane Cork — May 20, 2008
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 1 / 25
Distinguishing Multiplications from Squaring Operations Frederic - - PowerPoint PPT Presentation
Distinguishing Multiplications from Squaring Operations Frederic Amiel Benoit Feix Michael Tunstall Claire Whelan William P. Marnane Cork May 20, 2008 Michael Tunstall (University of Bristol) May 20, 2008 Cork 1 / 25 Introduction
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 1 / 25
Introduction
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 2 / 25
Introduction Side Channel Atomicity
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 3 / 25
Introduction The Hamming Weight
◮ Proportional to the Hamming weight of the data being manipulated (Hamming
◮ Proportional to the Hamming weight of the data being manipulated XORed with
◮ This is the model most commonly used for attacking microprocessor
◮ It also applies to some hardware implementations (Amiel et al., 2007).
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 4 / 25
Introduction Differential Power Analysis
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 5 / 25
Introduction Differential Power Analysis
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 6 / 25
The Difference in Hamming Weight of Operations
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 7 / 25
The Difference in Hamming Weight of Operations The Statistically Expected Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 8 / 25
The Difference in Hamming Weight of Operations The Statistically Expected Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 9 / 25
The Difference in Hamming Weight of Operations The Statistically Expected Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 10 / 25
The Difference in Hamming Weight of Operations The Statistically Expected Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 11 / 25
The Difference in Hamming Weight of Operations Demonstrating the Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 12 / 25
The Difference in Hamming Weight of Operations Demonstrating the Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 13 / 25
The Difference in Hamming Weight of Operations Demonstrating the Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 14 / 25
The Difference in Hamming Weight of Operations Demonstrating the Difference
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 15 / 25
Attacking Public Key Algorithms
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 16 / 25
Attacking Public Key Algorithms Attacking an Exponentiation
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 17 / 25
Attacking Public Key Algorithms Application to Elliptic Curve Cryptography
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 18 / 25
Countermeasures
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 19 / 25
Countermeasures Blinding
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 20 / 25
Countermeasures Blinding
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 21 / 25
Countermeasures Resistant Algorithms
◮ square and multiply always algorithm. ◮ the Montgomery Ladder. ◮ the BRIP algorithm. ◮ fixed window exponentiation. Michael Tunstall (University of Bristol) May 20, 2008 — Cork 22 / 25
Conclusion
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 23 / 25
Conclusion
◮ Applies in the presence of message and modulus blinding. ◮ Also applies when classical padding schemes are used, as no knowledge
◮ Exponent blinding hinders the attack — theoretical attack.
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 24 / 25
Conclusion
Michael Tunstall (University of Bristol) May 20, 2008 — Cork 25 / 25