Cryptology ePrint Archive: Report 2013/447

Dynamic Runtime Methods to Enhance Private Key Blinding

Karine Gandolfi-Villegas and Nabil Hamzi

Abstract: In this paper we propose new methods to blind exponents used in RSA and in elliptic curves based algorithms. Due to classical differential power analysis (DPA and CPA), a lot of countermeasures to protect exponents have been proposed since 1999 Kocher [20] and by Coron [13]. However, these blinding methods present some drawbacks regarding execution time and memory cost. It also got some weaknesses. Indeed they could also be targeted by some attacks such as The Carry Leakage on the Randomized Exponent proposed by P.A. Fouque et al. in [23] or inefficient against some others analysis such as Single Power Analysis. In this article, we explain how the most used method could be exploited when an attacker can access test samples. We target here new dynamic blinding methods in order to prevent from any learning phase and also to improve the resistance against the latest side channel analyses published.

Category / Keywords: implementation / Reverse engineering, exponent blinding, side channel attacks, RSA, ECC

Date: received 16 Jul 2013

Contact author: nabil hamzi at gemalto com

Available format(s): PDF | BibTeX Citation

Version: 20130722:122954 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]