







Vol.3 , No. 1, Publication Date: Feb. 19, 2016, Page: 16-21
[1] | E. Kesavulu Reddy, Department of Computer Science, Sri Venkateswara University, Tirupati, Andhra Pradesh, India. |
The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack models, cryptologists have made commonly-used cryptographic algorithms secure against such attacks. However, a real computing device not only generates the outputs specified in algorithms but also inevitably produces some other information such as timing and power. These types of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms. The attacker obtains the value of secret key at single instance some iteration is called Major Collisions. The attacker gains two values of random integer at some iteration are called Minor Collisions.We have provided a brief background on Simple (SPA) and Differential (DPA) power and electromagnetic analysis attacks on the classical ECSM algorithms. We study on minor collisions and to provide an analytic result for their probability of occurrence as well as effect of the fixed sequence window method. We prove that mathematically the minor collisions are reduced up to 50% of major collisions. We analysis the role of Major and Minor collisions in side channel attacks.
Keywords
Elliptic Curve Cryptography, Simple Power Analysis Attacks, Differential Analysis Attacks, Major Collisions, Minor Collisions
Reference
[01] | S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, “Towards sound approaches to counteract power-analysis attacks, ”Advances in Cryptology - Crypto’ 99, LNCS 1666, pp. 398-412, Springer-Verlag, 1999. |
[02] | M. Ciet, Aspects of Fast and Secure Arithmetics for Elliptic Curve Cryptography, Ph.D.thesis, Universit´te Catholique deLouvain, 2003. |
[03] | M. Ciet, J. J. Quisquater, and F. Sica, “Prevent-ing differential analysis in GLV elliptic curve scala rmultiplication, ”Cryptographic Hardware and Embedded Systems - CHES’ 02, LNCS2523, pp. 540-550, Springer- Verlag, 2003. |
[04] | C. Clavier, and M. Joye, “Universal exponentiation algorithm a first step towards provable SPA resistance, ”Cryptographic Hardware and Embedded Systems - CHES’ 01, LNCS 2162, pp. 300-308, Springer-Verlag, 2001. |
[05] | C. Clavier, and M. Joye, “Universal exponentiation algorithm a first step towards provable SPA-resistance, ” Cryptographic Hardware and Embedded Systems - CHES’ 01, LNCS 2162, pp. 300-308, Springer-Verlag, 2001. |
[06] | J. S. Coron, “Resistance against differential powera nalysis for elliptic curve cryptosystems, ”Crypto-graphic Hardware andEmbedded Systems - CHES’99, LNCS 1717, pp. 292-302, Springer-Verlag, 1999. |
[07] | N. M. Ebied, Key Randomization Counter Measures To Power Analysis Attacks on EllipticCurve Cryptosystems, Ph.D thesis, University of Waterloo, On-tario, Canada, 2007 |
[08] | C. Heuberger, and H. Prodinger, Personal commu-nication, Aug. 2003. |
[09] | M. Joye, and K. Villegas, “A protected division algorithm, ” Smart Card Research and Advanced Applications - CARDIS’ 02, pp. 59-68, Usenix Association, 2002. |
[10] | M. Joy, DefenesAgainst Side Channel Analysis, Ad-vances in Elliptic Curve Cryptography, Chap5, Cam-bridgeUniversity Press, 2005. |
[11] | P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis, ” Advances in Cryptology –CRYPTO’ 99, LNCS 1666, pp.388-397, Springer-Verlag, 1999. |
[12] | T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Investigations of power analysis attacks on smartcards, ” USENIX Workshop on Smart- card Technology, pp. 151-161. May 1999. |
[13] | T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart card security under the threatof power analysis attacks, ” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, May 2002. |
[14] | B. Moller, “Securing elliptic curve point multiplica-tion against side channel attacks, International Security Conference- ISC’ 01, LNCS 2200, pp. 324-334, Springer-Verlag, 2001. |
[15] | K. Okeya, and T. Takagi, “The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel at-tacks, ” Topics in Cryptology –CT-RSA’ 03, LNCS2612, pp. 328- 343, Springer-Verlag, 2003. |
[16] | P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis, ” Advances in Cryptology - CRYPTO’ 99, LNCS 1666, pp.388-397, Springer-Verlag, 1999. |