Paper 2011/236

Using Templates to Distinguish Multiplications from Squaring Operations

Neil Hanley, Michael Tunstall, and William P. Marnane

Abstract

Since side channel analysis was introduced as a method to recover secret information from an otherwise secure cryptosystem, many countermeasures have been proposed to prevent leakage from secure devices. Among these countermeasures is side channel atomicity that makes operations indistinguishable using side channel analysis. In this paper we present practical results of an attack on RSA signature generation, protected in this manner, based on the expected difference in Hamming weight between the result of a multiplication and a squaring operation. This work presents the first attack that we are aware of where template analysis can be used without requiring an open device to characterize an implementation of a given cryptographic algorithm. Moreover, an attacker does not need to know the plaintexts being operated on and, therefore, blinding and padding countermeasures applied to the plaintext do not hinder the attack in any way.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. An extended version will appear in Springer's International Journal of Information Security Infoma
Keywords
Side Channel Analysistemplate attackRSA
Contact author(s)
tunstall @ cs bris ac uk
History
2011-05-17: received
Short URL
https://ia.cr/2011/236
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/236,
      author = {Neil Hanley and Michael Tunstall and William P.  Marnane},
      title = {Using Templates to Distinguish Multiplications from Squaring Operations},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/236},
      year = {2011},
      url = {https://eprint.iacr.org/2011/236}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.