Volume 41 Issue 5
May  2017
Article Contents

CHEN Ai-dong, CHEN Yun, CAO Na-na. Improved Analysis Method of the Modular Multiplication Collision Attack[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 684-687. doi: 10.3969/j.issn.1001-0548.2012.05.008
Citation: CHEN Ai-dong, CHEN Yun, CAO Na-na. Improved Analysis Method of the Modular Multiplication Collision Attack[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 684-687. doi: 10.3969/j.issn.1001-0548.2012.05.008

Improved Analysis Method of the Modular Multiplication Collision Attack

doi: 10.3969/j.issn.1001-0548.2012.05.008
  • Received Date: 2010-11-29
  • Rev Recd Date: 2011-09-21
  • Publish Date: 2012-10-15
  • The simple power analysis attacks (SPA) of chosen-message contrary pairs is proposed by Miyamoto,which is an attack method based on searching the collision of modular multiplication. But in the real environment searching the collision is difficult. For this problem, the K-means clustering algorithm is proposed which can identify the modular multiplication collision automatically. The insignificant effects of collision attack are validated in the ASIC environment which suggested by Miyamoto. After the improvement method, by using a couple of power consumption curves it can recover more than 88% of the secret keys. Finally, the countermeasure of this attack method is discussed.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(3459) PDF downloads(67) Cited by()

Related
Proportional views

Improved Analysis Method of the Modular Multiplication Collision Attack

doi: 10.3969/j.issn.1001-0548.2012.05.008

Abstract: The simple power analysis attacks (SPA) of chosen-message contrary pairs is proposed by Miyamoto,which is an attack method based on searching the collision of modular multiplication. But in the real environment searching the collision is difficult. For this problem, the K-means clustering algorithm is proposed which can identify the modular multiplication collision automatically. The insignificant effects of collision attack are validated in the ASIC environment which suggested by Miyamoto. After the improvement method, by using a couple of power consumption curves it can recover more than 88% of the secret keys. Finally, the countermeasure of this attack method is discussed.

CHEN Ai-dong, CHEN Yun, CAO Na-na. Improved Analysis Method of the Modular Multiplication Collision Attack[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 684-687. doi: 10.3969/j.issn.1001-0548.2012.05.008
Citation: CHEN Ai-dong, CHEN Yun, CAO Na-na. Improved Analysis Method of the Modular Multiplication Collision Attack[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 684-687. doi: 10.3969/j.issn.1001-0548.2012.05.008

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return