DPA attack on the improved Ha-Moon algorithm
SCIE
SCOPUS
- Title
- DPA attack on the improved Ha-Moon algorithm
- Authors
- Shin, JH; Park, DJ; Lee, PJ
- Date Issued
- 2006-01
- Publisher
- SPRINGER-VERLAG BERLIN
- Abstract
- The Ha-Moon algorithm [4] is a countermeasure against power analysis using a randomized addition chain. It has two drawbacks in that it requires an inversion and has a right-to-left approach. Recently, Yen et al. improved the algorithm by removing these drawbacks [11], Their new algorithm is inversion-free, has 6, left-to-right approach, and employs a window method. They insisted that their algorithm leads to a more secure countermeasure in computing modular exponentiation against side-channel attacks. This algorithm, however, still has a similar weakness observed in [2, 10]. This paper shows that the improved HaMoon algorithm is vulnerable to differential power analysis even if we employ their method in selecting si.
- Keywords
- Ha-Moon algorithm; randomized exponentiation algorithm; side-channel attack; SIGNED-SCALAR MULTIPLICATION; POWER ANALYSIS; COUNTERMEASURE
- URI
- https://oasis.postech.ac.kr/handle/2014.oak/24077
- ISSN
- 0302-9743
- Article Type
- Article
- Citation
- LECTURE NOTES IN COMPUTER SCIENCE, vol. 3786, page. 283 - 291, 2006-01
- Files in This Item:
- There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.