In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and countermeasures for public key cryptosystems were against the main stage (square and multiply stage) of the modular exponentiation (or the point multiplication on an elliptic curve). We have many algorithms which achieve fast computation of exponentiations. When we compute an exponentiation, the exponent recoding has to be carried out before the main stage. There are some exponent recoding algorithms including conditional branches, in which instructions depend on the given exponent value. Consequently exponent recoding can constitute an information channel, providing the attacker with valuable information on the secret exponent. In this paper we show new algorithms of attack on exponent recoding. The proposed algorithms can recover the secret exponent, when the width-w NAF [9] and the unsigned/signed fractional window representation [5] are used.
[1]
George W. Reitwiesner,et al.
Binary Arithmetic
,
1960,
Adv. Comput..
[2]
Tsuyoshi Takagi,et al.
A More Flexible Countermeasure against Side Channel Attacks Using Window Method
,
2003,
CHES.
[3]
Jean-Sébastien Coron,et al.
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
,
1999,
CHES.
[4]
Paul C. Kocher,et al.
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
,
1996,
CRYPTO.
[5]
Siva Sai Yerubandi,et al.
Differential Power Analysis
,
2002
.
[6]
Tsuyoshi Takagi,et al.
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
,
2003,
CT-RSA.
[7]
Bodo Möller,et al.
Improved Techniques for Fast Exponentiation
,
2002,
ICISC.