{"title":"All bits cross correlation attack on the Montgomery Ladder implementation of RSA","authors":"E. Kuzu, A. Tangel","doi":"10.1109/ICDSP.2013.6622717","DOIUrl":null,"url":null,"abstract":"In this study, an improved, time sample cross correlation based power attack is applied on a Montgomery Ladder implementation of the RSA. In the attack, by using an implementation level property, power traces related to the all key bits are cross correlated with each other and resulting correlation values are summed and compared to a threshold to estimate the secret key of the target RSA implementation. The attack could retrieve all the key bits by using 75% lesser power traces when compared to the single fixed reference bit and 50% lesser power traces compared to the double fixed reference bits approaches which are applied on the same implementation earlier.","PeriodicalId":180360,"journal":{"name":"2013 18th International Conference on Digital Signal Processing (DSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 18th International Conference on Digital Signal Processing (DSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDSP.2013.6622717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this study, an improved, time sample cross correlation based power attack is applied on a Montgomery Ladder implementation of the RSA. In the attack, by using an implementation level property, power traces related to the all key bits are cross correlated with each other and resulting correlation values are summed and compared to a threshold to estimate the secret key of the target RSA implementation. The attack could retrieve all the key bits by using 75% lesser power traces when compared to the single fixed reference bit and 50% lesser power traces compared to the double fixed reference bits approaches which are applied on the same implementation earlier.