Some Security Aspects of the M IST Randomized Exponentiation Algorithm

  • Authors:
  • Colin D. Walter

  • Affiliations:
  • -

  • Venue:
  • CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

The MIST exponentiation algorithm is intended for use in embedded crypto-systems to provide protection against power analysis and other side channel attacks. It generates randomly different addition chains for performing a particular exponentiation. This means that side channel attacks on RSA decryption or signing which require averaging over a number of exponentiation power traces become impossible. However, averaging over digit-by-digit multiplication traces may allow the detection of operand re-use. Although this provides a handle for an attacker by which the exponent search space might be considerably reduced, the number of possible exponents is shown to be still well outside the range of feasible computation in the foreseeable future.