Paper 2004/349
A DPA Attack on the Improved Ha-Moon Algorithm
Dong Jin PARK and Pil Joong LEE
Abstract
The algorithm proposed by Ha and Moon [HM02] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen, Chen, Moon and Ha improved the algorithm by removing these drawbacks [YCMH04]. Their new algorithm is inversion-free, has a left-to-right approach and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [FMPV04,SPL04]. This paper shows that the improved Ha-Moon algorithm is vulnerable to differential power analysis even if we employ their method in selecting $s_i$.
Metadata
- Available format(s)
- PDF PS
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Ha-Moon algorithmrandomized exponentiationside-channel attack
- Contact author(s)
- djpark @ oberon postech ac kr
- History
- 2004-12-15: last of 2 revisions
- 2004-12-13: received
- See all versions
- Short URL
- https://ia.cr/2004/349
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2004/349, author = {Dong Jin PARK and Pil Joong LEE}, title = {A {DPA} Attack on the Improved Ha-Moon Algorithm}, howpublished = {Cryptology {ePrint} Archive, Paper 2004/349}, year = {2004}, url = {https://eprint.iacr.org/2004/349} }