메뉴 건너뛰기




Volumn 2288, Issue , 2002, Pages 414-427

A countermeasure against one physical cryptanalysis may benefit another attack

Author keywords

Cryptography; Exponentiation; Hardware fault cryptanalysis; Physical cryptanalysis; Power analysis attack; Side channel attack; Square multiply exponentiation; Timing attack

Indexed keywords

CRYPTOGRAPHY; ERRORS; HARDWARE; SECURITY OF DATA;

EID: 84949979593     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (83)

References (53)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystem”, Commun. of ACM, vol. 21, no. 2, pp. 120–126, 1978.
    • (1978) Commun. Of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 2
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469–472, 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 5
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • Feb
    • D. Boneh, “Twenty years of attacks on the RSA cryptosystem”, Notices of the AMS, vol. 46, no. 2, pp. 203–213, Feb 1999.
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 6
    • 84949988421 scopus 로고    scopus 로고
    • New threat model breaks crypto codesSept
    • Bellcore Press Release, “New threat model breaks crypto codes”, Sept. 1996, available at URL .
    • (1996)
  • 7
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Springer-Verlag
    • D. Boneh, R.A. DeMillo, and R.J. Lipton, “On the importance of checking cryptographic protocols for faults”, In Advances in Cryptology–EUROCRYPT’97, LNCS 1233, pp. 37–51, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology–EUROCRYPT’97, LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 9
    • 33749904500 scopus 로고    scopus 로고
    • Breaking real-world implementations of cryptosystems by manipulating their random number generation
    • Fukuoka, Japan, 29th January–1st February 1997. An earlier version was presented at the rump session of ASIACRYPT’96
    • Y. Zheng and T. Matsumoto, “Breaking real-world implementations of cryptosystems by manipulating their random number generation”, In Pre-proceedings of the 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, 29th January–1st February 1997. An earlier version was presented at the rump session of ASIACRYPT’96.
    • Pre-Proceedings of the 1997 Symposium on Cryptography and Information Security
    • Zheng, Y.1    Matsumoto, T.2
  • 10
    • 0038214614 scopus 로고    scopus 로고
    • Chinks in digital armor–Exploiting faults to break smart-card cryptosystems
    • I. Peterson, “Chinks in digital armor–Exploiting faults to break smart-card cryptosystems”, Science News, vol. 151, no. 5, pp. 78–79, 1997.
    • (1997) Science News , vol.151 , Issue.5 , pp. 78-79
    • Peterson, I.1
  • 11
    • 84949230268 scopus 로고    scopus 로고
    • RSA-type signatures in the presence of transient faults
    • Springer-Verlag
    • M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, “RSA-type signatures in the presence of transient faults”, In Cryptography and Coding, LNCS 1355, pp. 155–160, Springer-Verlag, 1997.
    • (1997) Cryptography and Coding, LNCS , vol.1355 , pp. 155-160
    • Joye, M.1    Quisquater, J.-J.2    Bao, F.3    Deng, R.H.4
  • 12
    • 84948990454 scopus 로고    scopus 로고
    • Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
    • Springer-Verlag, Berlin
    • D.P. Maher, “Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective”, In Financial Cryptography, LNCS 1318, pp. 109–121, Springer-Verlag, Berlin, 1997.
    • (1997) Financial Cryptography, LNCS , vol.1318 , pp. 109-121
    • Maher, D.P.1
  • 13
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Springer-Verlag, Berlin
    • E. Biham and A. Shamir, “Differential fault analysis of secret key cryptosystems”, In Advances in Cryptology–CRYPTO’97, LNCS 1294, pp. 513–525, Springer-Verlag, Berlin, 1997.
    • (1997) Advances in Cryptology–CRYPTO’97, LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 15
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • M. Joye, A.K. Lenstra, and J.-J. Quisquater, “Chinese remaindering based cryptosystems in the presence of faults”, Journal of Cryptology, vol. 12, no. 4, pp. 241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 17
    • 84949936283 scopus 로고    scopus 로고
    • presented at the rump session of EUROCRYPT’97, Konstanz, Germany, 11–15th May
    • A. Shamir, “How to check modular exponentiation”, presented at the rump session of EUROCRYPT’97, Konstanz, Germany, 11–15th May 1997.
    • (1997) How to Check Modular Exponentiation
    • Shamir, A.1
  • 19
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against faultbased cryptanalysis
    • Sept
    • S.M. Yen and M. Joye, “Checking before output may not be enough against faultbased cryptanalysis”, IEEE Trans. on Computers, vol. 49, no. 9, pp. 967–970, Sept. 2000.
    • (2000) IEEE Trans. On Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 20
  • 21
    • 0003442756 scopus 로고    scopus 로고
    • vol. 265 of London Mathematical Society Lecture Note Series, Cambridge University Press
    • I.F. Blake, G. Seroussi, and N.P. Smart. Elliptic curves in cryptography. vol. 265 of London Mathematical Society Lecture Note Series, Cambridge University Press, 1999.
    • (1999) Elliptic Curves in Cryptography
    • Blake, I.F.1    Seroussi, G.2    Smart, N.P.3
  • 22
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Springer-Verlag
    • P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems”, In Advances in Cryptology–CRYPTO’96, LNCS 1109, pp. 104–113, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology–CRYPTO’96, LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 26
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the Chinese Remainder Theorem
    • Springer-Verlag
    • W. Schindler, “A timing attack against RSA with the Chinese Remainder Theorem”, In Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS 1965, pp. 109–124, Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS , vol.1965
    • Schindler, W.1
  • 27
    • 18744414026 scopus 로고    scopus 로고
    • Comments on some new attacks on cryptographic devices
    • July
    • B.S. Kaliski Jr. and M.J.B. Robshaw, “Comments on some new attacks on cryptographic devices”, RSA Laboratories Bulletin, no. 5, July 1997.
    • (1997) RSA Laboratories Bulletin , vol.5
    • Kaliski, B.S.1    Robshaw, M.2
  • 30
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Springer-Verlag
    • J.-S. Coron, “Resistance against differential power analysis for elliptic curve cryptosystems”, In Cryptographic Hardware and Embedded Systems–CHES’99, LNCS 1717, pp. 292–302, Springer-Verlag, 1999.
    • (1999) Cryptographic Hardware and Embedded Systems–CHES’99, LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 33
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Springer-Verlag
    • K. Okeya and K. Sakurai, “Power analysis breaks elliptic curve cryptosystems even secure against the timing attack”, In Advances in Cryptology–INDOCRYPT2000, LNCS 1977, pp. 178–190, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology–INDOCRYPT2000, LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 40
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • Springer-Verlag
    • S. Chari, C.S. Jutla, J.R. Rao, and P. Rohatgi, “Towards sound approaches to counteract power-analysis attacks”, In Advances in Cryptology–CRYPTO’99, LNCS 1666, pp. 398–412, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology–CRYPTO’99, LNCS , vol.1666 , pp. 398-412
    • Chari, S.1    Jutla, C.S.2    Rao, J.R.3    Rohatgi, P.4
  • 44
    • 68549105908 scopus 로고    scopus 로고
    • On boolean and arithmetic masking against differential power analysis
    • Springer-Verlag
    • J.-S. Coron and L. Goubin, “On boolean and arithmetic masking against differential power analysis”, In Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS 1965, pp. 231–237, Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS , vol.1965 , pp. 231-237
    • Coron, J.-S.1    Goubin, L.2
  • 45
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Springer-Verlag
    • T.S. Messerges, “Using second-order power analysis to attack DPA resistant software”, In Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS 1965, pp. 238–251, Springer-Verlag, 2000.
    • (2000) Cryptographic Hardware and Embedded Systems–CHES 2000, LNCS , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 49
    • 0020751036 scopus 로고
    • A computer algorithm for the product AB modulo M
    • May
    • G.R. Blakley, “A computer algorithm for the product AB modulo M”, IEEE Transactions on Computers, vol. 32, no. 5, pp. 497–500, May 1983.
    • (1983) IEEE Transactions on Computers , vol.32 , Issue.5 , pp. 497-500
    • Blakley, G.R.1
  • 50
    • 3042549976 scopus 로고
    • Comments on “A computer algorithm for the product AB modulo M
    • March
    • K.R. Sloan Jr., Comments on “A computer algorithm for the product AB modulo M”, IEEE Transactions on Computers, vol. 34, no. 3, pp. 290–292, March 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.3 , pp. 290-292
    • Sloan, K.R.1
  • 51
    • 0003421346 scopus 로고    scopus 로고
    • Technical Report TR 801, RSA Laboratories, Redwood City, April
    • Ç. K. Koç, “RSA hardware implementation”, Technical Report TR 801, RSA Laboratories, Redwood City, April 1996
    • (1996) RSA Hardware Implementation
    • Koç, Ç.K.1
  • 52
    • 35248892162 scopus 로고    scopus 로고
    • LCIS Technical Report TR-2K1-9, Dept. of Computer Science and Information Engineering, National Central University, Taiwan, May 3
    • S.M. Yen and S.Y. Tseng, “Differential power cryptanalysis of a Rijndael implementation”, LCIS Technical Report TR-2K1-9, Dept. of Computer Science and Information Engineering, National Central University, Taiwan, May 3, 2001.
    • (2001) Differential Power Cryptanalysis of a Rijndael Implementation
    • Yen, S.M.1    Tseng, S.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.