Improving CPA Attack Against DSA and ECDSA

Marek Repka 1 , Michal Varchola 2  and Miloš Drutarovský 2
  • 1 Institute of Computer Science and Mathematics, Faculty of Electrical Engineering and Information Technology, Ilkovičova 3, Bratislava, SK-812 19, Slovak Republic
  • 2 Department of Electronics and Multimedia Communications, Faculty of Electrical Engineering and Informatics, Letná 9, 04120, Košice, Slovak Republic

Abstract

In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA). The attack is aimed against integer multiplication with constant secret operand. We demonstrate this improvement on 16-bit integer multiplier in FPGA. The improvement makes it possible to guess more blocks of key, and the improvement also eliminates errors of simulated attacks what is very important when approximating attack success rate and complexity based on simulated attacks. We also discus a possible efficient countermeasure.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] KOCHER, P. C.-JAFFE, J.-JUN, B. : Differential Power Analysis, Proc. of the 19th Annual International Cryptol- ogy Conference on Advances in Cryptology in CRYPTO ’99, Springer-Verlag, London, UK, 1999, pp. 388-397.

  • [2] BRIER, E.-CLAVIER, C.-OLIVIER, F. : Correlation Power Analysis with a Leakage Model, CHES, Handbook, Mill Valley, CA: University Science, 2004, pp. 16-29.

  • [3] QUISQUATER, J.-J.-SAMYDE, D. : Electro-Magnetic Anal- ysis (EMA), Measures and Counter-Measures for Smart Cards Proceedings of E-SMART ’01, Springer-Verlag, London, UK, 2001, pp. 200-210.

  • [4] DING, G. L.-CHU, J.-YUAN, L. ZHAO, Q. : Correlation Electromagnetic Analysis for Cryptographic Device, Proc. of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, IEEE Computer Society, Washington, DC, USA, 2009, pp. 388-391.

  • [5] MANGARD, S.-OSWALD, E.-POPP, T. : Power Analysis Attacks - Revealing the Secrets of Smart Cards, Advances in Information Security, Handbook, Springer-Verlag, New York, 2007.

  • [6] MEDWED, M.-OSWALD, M. E. : Template Attacks on ECDSA, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers in Lec- ture Notes in Computer Science, Springer, 2009, pp. 14-27.

  • [7] STANDAERT, F.-X.-MALKIN, T.-YUNG. M. : A Unified Framework for the Analysis of Side-Channel Key Recovery At- tacks, In Advances in Cryptology EUROCRYPT 2009 (A. Joux,, ed.), LNCS 5479, Springer, Berlin, pp. 443-461.

  • [8] SCHINDLER, W.-LEMKE, K.-PAAR, C. : A Stochastic Model for Differential Side Channel Cryptanalysis, In Crypto- graphic Hardware and Embedded Systems CHES 2005, LNCS 3659, Springer, pp. 30-46.

  • [9] RIVAIN, M. : On the Exact Success Rate of Side Channel Anal- ysis in the Gaussian Model, In Selected Areas in Cryptography (R. Avanzi, L. Keliher, and F. Sica, eds.), LNCS 5381, Springer, Berlin, pp. 165-183.

  • [10] BATINA, L.-GIERLICHS, B.-PROUFF, E.-RIVAIN, M.- STANDAERT, F.-X.-VEYRAT-CHARVILLON, N. : Mutual Information Analysis: a Comprehensive Study, Journal of Cryp- tology 24 No. 2 (2011), 269-291.

  • [11] HEUSER, A.-ZOHNER, M. : Intelligent Machine Homicide - Breaking Cryptographic Devices using Support Vector Ma- chines, In Constructive Side-Channel Analysis and Secure De- sign 3th International Workshop, COSADE 2012, Proceedings (Schindler and Huss, eds.), LNCS 7275, Springer, Darmstadt, Germany, 2012, pp. 249-264.

  • [12] KARPOVSKY, M. G.-KULIKOWSKI, K. J.-TAUBIN, A. : Robust Protection against Fault Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard, In: DSN, IEEE Computer Society, Florence, Italy, 2004, pp. 93-101.

  • [13] GUILLEY, S.-SAUVAGE, L.-DANGER, J. L.-SELMANE, N. : Fault Injection Resilience, In FDTC, IEEE Computer So- ciety, Santa Barbara, CA, USA, Aug 2010, pp. 51-65.

  • [14] CLAVIER, C.-GAJ, K. : Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, Pro- ceedings 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 CHES, Springer, Berlin Heidelberg, 2009, pp. 382-395.

  • [15] HUTTER, M.-MEDWED, M.-HEIN, D.-WOLKERSTOR- FER, J. : Attacking ECDSA-Enabled RFID Devices, ACNS 2009, LNCS 5536, Springer-Verlag, Berlin Heidelberg, 2009, pp. 519-534.

  • [16] DANGER, J. L.-GUILLEY, S.-BHASIN, S.-NASSAR, M. : Overview of Dual Rail with Precharge Logic Styles to Thwart Implementation-Level Attacks on Hardware Cryptoprocessors, New Attacks and Improved CounterMeasures, In: SCS (Novem- ber 6-8, 2009), IEEE, Jerba Tunisia, p. 18.

  • [17] AKKAR, M.-L.-GIRUAD, C. : An Implementation of DES and AES, Secure Against some Attacks, In Cryptographic Hard- ware and Embedded Systems - CHESS 2001, Proceedings Third Interational Workshop, Paris, France, May 14-16, Springer, 2001, pp. 309-318.

OPEN ACCESS

Journal + Issues

Search