Horizontal Correlation Analysis on Exponentiation

Download Now
Provided by: Université de Liège
Topic: Security
Format: PDF
The authors introduce in this paper a technique in which they apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the big mac attack, longer keys may facilitate this analysis and success will depend on the arithmetic coprocessor characteristics. They present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to their attack.
Download Now

Find By Topic