Sciweavers

LATINCRYPT
2010

Combined Implementation Attack Resistant Exponentiation

13 years 10 months ago
Combined Implementation Attack Resistant Exponentiation
Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, therefore, often developed and implemented accordingly. However, Amiel et al. showed that an adversary can successfully combine two attack methods to overcome such countermeasures. In this paper, we consider instances of these combined attacks applied to RSA and elliptic curve-based cryptosystems. We show how previously proposed countermeasures may fail to thwart these attacks, and propose a countermeasure that protects the variables in a generic exponentiation algorithm in the same scenario.
Jörn-Marc Schmidt, Michael Tunstall, Roberto
Added 14 Feb 2011
Updated 14 Feb 2011
Type Journal
Year 2010
Where LATINCRYPT
Authors Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald
Comments (0)