From theory to practice: horizontal attacks on protected implementations of modular exponentiations - IMT - Institut Mines-Télécom Accéder directement au contenu
Article Dans Une Revue Journal of Cryptographic Engineering Année : 2019

From theory to practice: horizontal attacks on protected implementations of modular exponentiations

Résumé

Nowadays, horizontal or single-shot side-channel attacks against protected implementations of RSA and similar algorithms constitute a theoretic threat against secure devices. Nevertheless, in practice their application remains very difficult not only because of their complexity, but also because of environmental countermeasures integrated by designers that render their application even more difficult. Horizontal side-channel attacks take place in multiple steps. Among them, the most important are the acquisition of a complete trace with a sufficiently high sampling rate, its cutting into regular patterns, the realignment of the obtained patterns, the reduction as far as possible of noise in the acquired trace, the identification of the points of interest and the application of an effective distinguisher. Each of these steps is crucial and leads, if performed without enough attention, to an unsuccessful attack. In this context, this paper introduces effective solutions to efficiently perform all these steps, i.e., practicable means for implementing efficient horizontal attacks.
Fichier non déposé

Dates et versions

lirmm-01713147 , version 1 (20-02-2018)

Identifiants

Citer

Ibrahima Diop, Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet, Philippe Maurine. From theory to practice: horizontal attacks on protected implementations of modular exponentiations. Journal of Cryptographic Engineering, 2019, 9 (1), pp.37-52. ⟨10.1007/s13389-018-0181-1⟩. ⟨lirmm-01713147⟩
427 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More