Paper 2004/349

A DPA Attack on the Improved Ha-Moon Algorithm

Dong Jin PARK and Pil Joong LEE

Abstract

The algorithm proposed by Ha and Moon [HM02] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen, Chen, Moon and Ha improved the algorithm by removing these drawbacks [YCMH04]. Their new algorithm is inversion-free, has a left-to-right approach and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [FMPV04,SPL04]. This paper shows that the improved Ha-Moon algorithm is vulnerable to differential power analysis even if we employ their method in selecting $s_i$.

Metadata
Available format(s)
PDF PS
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
Ha-Moon algorithmrandomized exponentiationside-channel attack
Contact author(s)
djpark @ oberon postech ac kr
History
2004-12-15: last of 2 revisions
2004-12-13: received
See all versions
Short URL
https://ia.cr/2004/349
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/349,
      author = {Dong Jin PARK and Pil Joong LEE},
      title = {A DPA Attack on the Improved Ha-Moon Algorithm},
      howpublished = {Cryptology ePrint Archive, Paper 2004/349},
      year = {2004},
      note = {\url{https://eprint.iacr.org/2004/349}},
      url = {https://eprint.iacr.org/2004/349}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.