TY - GEN
T1 - Chosen-message SPA attacks against FPGA-based RSA hardware implementations
AU - Miyamoto, Atsushi
AU - Homma, Naofumi
AU - Aoki, Takqfumi
AU - Satoh, Akashi
PY - 2008
Y1 - 2008
N2 - This paper presents SPA (Simple Power Analysis) attacks against public-key eryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by a cryptographic module, and reveals a secret key in the module. We focus on chosen-message SPA attacks, which enhances the differences of operating waveforms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, Yen showed a unique SPA attack against RSA cryp-tosystem, but no verification experiment using actual software or hardware was performed. In this paper, we implemented four-types of RSA processors on an FPGA platform in combination with two variants of the Montgomery multiplication algorithm and two different types of multipliers for SPA attacks experiments. Then we demonstrated effectiveness of various chosen-message attacks as well as Yen's method, and investigated the characteristics of the attacks depending on the hardware architectures.
AB - This paper presents SPA (Simple Power Analysis) attacks against public-key eryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by a cryptographic module, and reveals a secret key in the module. We focus on chosen-message SPA attacks, which enhances the differences of operating waveforms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, Yen showed a unique SPA attack against RSA cryp-tosystem, but no verification experiment using actual software or hardware was performed. In this paper, we implemented four-types of RSA processors on an FPGA platform in combination with two variants of the Montgomery multiplication algorithm and two different types of multipliers for SPA attacks experiments. Then we demonstrated effectiveness of various chosen-message attacks as well as Yen's method, and investigated the characteristics of the attacks depending on the hardware architectures.
UR - http://www.scopus.com/inward/record.url?scp=54949152330&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=54949152330&partnerID=8YFLogxK
U2 - 10.1109/FPL.2008.4629904
DO - 10.1109/FPL.2008.4629904
M3 - Conference contribution
AN - SCOPUS:54949152330
SN - 9781424419616
T3 - Proceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL
SP - 35
EP - 40
BT - Proceedings - 2008 International Conference on Field Programmable Logic and Applications, FPL
T2 - 2008 International Conference on Field Programmable Logic and Applications, FPL
Y2 - 8 September 2008 through 10 September 2008
ER -