Horizontal Correlation Analysis on Exponentiation

Provided by: Université de Liège
Topic: Security
Format: PDF
The authors introduce in this paper a technique in which they apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. As in the big mac attack, longer keys may facilitate this analysis and success will depend on the arithmetic coprocessor characteristics. They present the theory of the attack with some practical successful results on an embedded device and analyze the efficiency of classical countermeasures with respect to their attack.

Find By Topic