2014
DOI: 10.1007/978-3-319-08302-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations

Abstract: Abstract. Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attacks on secret exponents are typically bound to the leakage of single executions due to cryptographic protocols or side-channel countermeasures such as blinding. We propose for the first time, to use a well-established class of algorithms, i.e. unsupervised cluster classification algorithms such as the k-means algorithm to attack cryptographic exponentiations and recover secret exponents without any prio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 24 publications
0
26
0
1
Order By: Relevance
“…Montgomery's ladder [41], Joye's regular algorithms [33], and other algorithms, where for-loops iterate only on non-static values, are not vulnerable because there is no static T that would be used in Ψ which is required by our attacks. However, other similar types of single-trace attacks have recently identified similar weaknesses also in such algorithms (e.g., [4,5,31]). …”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Montgomery's ladder [41], Joye's regular algorithms [33], and other algorithms, where for-loops iterate only on non-static values, are not vulnerable because there is no static T that would be used in Ψ which is required by our attacks. However, other similar types of single-trace attacks have recently identified similar weaknesses also in such algorithms (e.g., [4,5,31]). …”
Section: Preliminariesmentioning
confidence: 99%
“…Clustering has been previously used in side-channel attacks on ECC by Heyszl et al in [31]. They used it for launching an attack without any profile about the device (a hardware implementation) by clustering repeating patterns in a power trace; i.e., they would cluster the entire trace of Ψ .…”
Section: Clustering Attack With Unknown Precomputationsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [18], unsupervised learning has been presented to demonstrate the efficiency of localized EM attacks on exponentiations using a kmeans clustering algorithm to differentiate the attacked samples. Their attack is performed on an ECC [27] implementation over a binary field using Lopez-Dahab coordinates [26].…”
Section: Introductionmentioning
confidence: 99%