DPA attack on the improved ha-moon algorithm

  • Authors:
  • Jong Hoon Shin;Dong Jin Park;Pil Joong Lee

  • Affiliations:
  • Information Security Laboratory, Dept. of EEE, Postech, Pohang, Korea;Information Security Laboratory, Dept. of EEE, Postech, Pohang, Korea;Information Security Laboratory, Dept. of EEE, Postech, Pohang, Korea

  • Venue:
  • WISA'05 Proceedings of the 6th international conference on Information Security Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Ha-Moon algorithm [4] is a countermeasure against power analysis using a randomized addition chain. It has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen et al. improved the algorithm by removing these drawbacks [11]. Their new algorithm is inversion-free, has a left-to-right approach, and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [2, 10]. This paper shows that the improved Ha-Moon algorithm is vulnerable to differential power analysis even if we employ their method in selecting si.