ISSN Print: 2381-1137  ISSN Online: 2381-1145
International Journal of Wireless Communications, Networking and Mobile Computing  
Manuscript Information
 
 
The Role of Major and Minor Collisions in Side Channel Attacks
International Journal of Wireless Communications, Networking and Mobile Computing
Vol.3 , No. 1, Publication Date: Feb. 19, 2016, Page: 16-21
965 Views Since February 19, 2016, 627 Downloads Since Feb. 19, 2016
 
 
Authors
 
[1]    

E. Kesavulu Reddy, Department of Computer Science, Sri Venkateswara University, Tirupati, Andhra Pradesh, India.

 
Abstract
 

The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack models, cryptologists have made commonly-used cryptographic algorithms secure against such attacks. However, a real computing device not only generates the outputs specified in algorithms but also inevitably produces some other information such as timing and power. These types of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms. The attacker obtains the value of secret key at single instance some iteration is called Major Collisions. The attacker gains two values of random integer at some iteration are called Minor Collisions.We have provided a brief background on Simple (SPA) and Differential (DPA) power and electromagnetic analysis attacks on the classical ECSM algorithms. We study on minor collisions and to provide an analytic result for their probability of occurrence as well as effect of the fixed sequence window method. We prove that mathematically the minor collisions are reduced up to 50% of major collisions. We analysis the role of Major and Minor collisions in side channel attacks.


Keywords
 

Elliptic Curve Cryptography, Simple Power Analysis Attacks, Differential Analysis Attacks, Major Collisions, Minor Collisions


Reference
 
[01]    

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, “Towards sound approaches to counteract power-analysis attacks, ”Advances in Cryptology - Crypto’ 99, LNCS 1666, pp. 398-412, Springer-Verlag, 1999.

[02]    

M. Ciet, Aspects of Fast and Secure Arithmetics for Elliptic Curve Cryptography, Ph.D.thesis, Universit´te Catholique deLouvain, 2003.

[03]    

M. Ciet, J. J. Quisquater, and F. Sica, “Prevent-ing differential analysis in GLV elliptic curve scala rmultiplication, ”Cryptographic Hardware and Embedded Systems - CHES’ 02, LNCS2523, pp. 540-550, Springer- Verlag, 2003.

[04]    

C. Clavier, and M. Joye, “Universal exponentiation algorithm a first step towards provable SPA resistance, ”Cryptographic Hardware and Embedded Systems - CHES’ 01, LNCS 2162, pp. 300-308, Springer-Verlag, 2001.

[05]    

C. Clavier, and M. Joye, “Universal exponentiation algorithm a first step towards provable SPA-resistance, ” Cryptographic Hardware and Embedded Systems - CHES’ 01, LNCS 2162, pp. 300-308, Springer-Verlag, 2001.

[06]    

J. S. Coron, “Resistance against differential powera nalysis for elliptic curve cryptosystems, ”Crypto-graphic Hardware andEmbedded Systems - CHES’99, LNCS 1717, pp. 292-302, Springer-Verlag, 1999.

[07]    

N. M. Ebied, Key Randomization Counter Measures To Power Analysis Attacks on EllipticCurve Cryptosystems, Ph.D thesis, University of Waterloo, On-tario, Canada, 2007

[08]    

C. Heuberger, and H. Prodinger, Personal commu-nication, Aug. 2003.

[09]    

M. Joye, and K. Villegas, “A protected division algorithm, ” Smart Card Research and Advanced Applications - CARDIS’ 02, pp. 59-68, Usenix Association, 2002.

[10]    

M. Joy, DefenesAgainst Side Channel Analysis, Ad-vances in Elliptic Curve Cryptography, Chap5, Cam-bridgeUniversity Press, 2005.

[11]    

P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis, ” Advances in Cryptology –CRYPTO’ 99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.

[12]    

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Investigations of power analysis attacks on smartcards, ” USENIX Workshop on Smart- card Technology, pp. 151-161. May 1999.

[13]    

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart card security under the threatof power analysis attacks, ” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, May 2002.

[14]    

B. Moller, “Securing elliptic curve point multiplica-tion against side channel attacks, International Security Conference- ISC’ 01, LNCS 2200, pp. 324-334, Springer-Verlag, 2001.

[15]    

K. Okeya, and T. Takagi, “The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel at-tacks, ” Topics in Cryptology –CT-RSA’ 03, LNCS2612, pp. 328- 343, Springer-Verlag, 2003.

[16]    

P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis, ” Advances in Cryptology - CRYPTO’ 99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership