Attack scenario construction with a new sequential mining technique

Signed digit radix-r representation (such as omegarNAF) is used for the efficient implementation of the pairing based cryptosystems. The side channel attack, which uses the leaked information such as power consumption and timing information from a cryptographic device, is a serious threat to the implementations of a cryptosystem. In this paper, we utilize the simple power analysis technique to analyze the security of the scalar multiplication using omegarNAF representation and we can see that the omegarNAF is not a SPA resistant receding. In order to resist against SPA, we present two integer recodings (right-to-left and left-to-right) using two special digit sets respectively. The two recodings can be used to perform the scalar multiplication with a fixed sequence of operations without inserting dummy operations. Compared to Han's fixed pattern scheme, the proposed schemes can reduce about 16.7% to 37.5% table sizes (the number of precomputed and needed to be stored points) for r = 3, 5 and w = 2, 3,4, 5.

[1]  Tsuyoshi Takagi,et al.  Some Analysis of Radix-r Representations , 2005, IACR Cryptol. ePrint Arch..

[2]  Peng Ning,et al.  Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.

[3]  Nigel P. Smart,et al.  Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three , 2003, Applicable Algebra in Engineering, Communication and Computing.

[4]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[5]  Janak H. Patel Performance of Processor-Memory Interconnections for Multiprocessors , 1981, IEEE Transactions on Computers.

[6]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[7]  Marc Joye,et al.  Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity , 2004, IEEE Transactions on Computers.

[8]  Dharma P. Agrawal,et al.  A Survey and Comparision of Fault-Tolerant Multistage Interconnection Networks , 1987, Computer.

[9]  Nigel P. Smart,et al.  Hardware Implementation of Finite Fields of Characteristic Three , 2002, CHES.

[10]  Xinzhou Qin,et al.  A Probabilistic-Based Framework for INFOSEC Alert Correlation , 2005 .

[11]  Wenke Lee,et al.  Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.

[12]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[13]  Nicolas Thériault,et al.  SPA Resistant Left-to-Right Integer Recodings , 2005, IACR Cryptol. ePrint Arch..

[14]  Bodo Möller,et al.  Securing Elliptic Curve Point Multiplication against Side-Channel Attacks , 2001, ISC.

[15]  John Paul Shen Fault tolerance analysis of several interconnection networks , 1982, ICPP.

[16]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[17]  Sudhakar M. Reddy,et al.  Augmented Shuffle-Exchange Multistage Interconnection Networks , 1987, Computer.

[18]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[19]  Tsuyoshi Takagi,et al.  Radix-r Non-Adjacent Form , 2004, ISC.

[20]  Tse-yun Feng,et al.  A Survey of Interconnection Networks , 1981, Computer.

[21]  Howard Jay Siegel,et al.  The Extra Stage Cube: A Fault-Tolerant Interconnection Network for Supersystems , 1982, IEEE Transactions on Computers.

[22]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[23]  Ian F. Blake,et al.  Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .

[24]  Wenke Lee,et al.  Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.

[25]  Marc Joye,et al.  The Montgomery Powering Ladder , 2002, CHES.

[26]  Nigel P. Smart,et al.  Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems , 2002 .

[27]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[28]  Peng Ning,et al.  Techniques and tools for analyzing intrusion alerts , 2004, TSEC.

[29]  Peng Ning,et al.  Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.

[30]  Kuldip Singh,et al.  On a fault-tolerant multistage interconnection network , 1994 .