Simple power analysis on exponentiation revisited

  • Authors:
  • Jean-Christophe Courrège;Benoit Feix;Mylène Roussellet

  • Affiliations:
  • CEACI-THALES, Toulouse, France;INSIDE CONTACTLESS, Aix-en-Provence, Cedex 3, France;INSIDE CONTACTLESS, Aix-en-Provence, Cedex 3, France

  • Venue:
  • CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Power Analysis has been studied since 1998 when P. Kocher et al. presented the first attack. From the initial Simple Power Analysis more complex techniques have been designed and studied during the previous decade such as Differential and Correlation Power Analysis. In this paper we revisit Simple Power Analysis which is at the heart of side channel techniques. We aim at showing its true efficiency when studied rigorously. Based on existing Chosen Message attacks we explain in this paper how particular message values can reveal the secret exponent manipulated during a modular exponentiation with a single power consumption curve. We detail the different ways to achieve this and then show that some blinded exponentiations can still be threatened by Simple Power Analysis depending on the implementation. Finally we will give advice on countermeasures to prevent such enhanced Simple Power Analysis techniques.