On XTR and side-channel analysis

  • Authors:
  • Daniel Page;Martijn Stam

  • Affiliations:
  • Dept. Computer Science, University of Bristol, Bristol, United Kingdom;Dept. Computer Science, University of Bristol, Bristol, United Kingdom

  • Venue:
  • SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR ideal for use on smart-cards, the devices that suffer most from vulnerability to side-channel attack. However, there are relatively few papers investigating the side-channel security of XTR and although some ECC techniques can be re-used, there are also notable differences. We aim to fill this gap in the literature. We present the first known SPA attack against XTR double exponentiation and two defence methods against such an attack. We also investigate methods of defending XTR against DPA attack.