You are looking at a specific version 20040527:033907 of this paper. See the latest version.

Paper 2004/123

On security of XTR public key cryptosystems against Side Channel Attacks

Dong-Guk Han and Jongin Lim and Kouichi Sakurai

Abstract

The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security. It is regarded that XTR is suitable for a variety of environments, including low-end smart cards, and XTR is the excellent alternative to either RSA or ECC. In \cite{LV00a,SL01}, authors remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as timing attacks and Differential Power Analysis (DPA). In this paper, however, we investigate the security of side channel attack (SCA) on XTR. This paper shows that XTR-SE is immune against simple power analysis (SPA) under assumption that the order of the computation of XTR-SE is carefully considered. However we show that XTR-SE is vulnerable to Data-bit DPA (DDPA)\cite{Cor99}, Address-bit DPA (ADPA)\cite{IIT02}, and doubling attack \cite{FV03}. Moreover, we propose two countermeasures that prevent from DDPA and a countermeasure against ADPA. One of the countermeasures using randomization of the base element proposed to defeat DDPA, i.e., randomization of the base element using field isomorphism, could be used to break doubling attack. Thus if we only deal with SPA, DDPA, ADPA, and doubling attack as the attack algorithm for XTR-SE, XTR-SE should be added following countermeasures: randomization of the base element using field isomorphism (DDPA and doubling attack) + randomized addressing (ADPA). But the proposed countermeasure against doubling attack is very inefficient. So to maintain the advantage of efficiency of XTR a good countermeasure against doubling attack is actually necessary.

Note: This is a full version of a paper that will been published in ACISP04.

Metadata
Available format(s)
PDF PS
Category
Applications
Publication info
Published elsewhere. Accepted at the ACISP 2004.
Keywords
XTR Public Key CryptosystemSide Channel AttacksSPAData-bit DPAAddress-bit DPAdoubling attack
Contact author(s)
DongGuk Han (christa @ korea ac kr)
History
2004-05-27: revised
2004-05-26: received
See all versions
Short URL
https://ia.cr/2004/123
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.