• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method


Ahn Mahn-Ki, Ha Jae-Cheol, Lee Hoon-Jae, Moon Sang-Jae, Journal of Internet Computing and Services, Vol. 4, No. 3, pp. 1-8, Jun. 2003
Full Text:
Keywords: smartcard, differential power analysis, NAF algorithm, Elliptic Curve Cryptosystem

Abstract

The power analysis attack is a physical attack which can be applied to the cryptosystems such as smartcard. We try to experimental attack to a smart card which implemented Elliptic Curve Cryptosystem adopting NAF algorithm as a secret key recording method. Our differential power analysis attack is a potential threat to that implementation. The attacker measures the power traces during the multiplication with secret key bits in a target smart card and the multiplication with the guessed bits in other experimental one. The comparison of these two traces gives a secret bit, which means that attacker can find all secret key bits successively.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Ahn Mahn-Ki, Ha Jae-Cheol, Lee Hoon-Jae, & Moon Sang-Jae (2003). Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method. Journal of Internet Computing and Services, 4(3), 1-8.

[IEEE Style]
A. Mahn-Ki, H. Jae-Cheol, L. Hoon-Jae and M. Sang-Jae, "Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method," Journal of Internet Computing and Services, vol. 4, no. 3, pp. 1-8, 2003.

[ACM Style]
Ahn Mahn-Ki, Ha Jae-Cheol, Lee Hoon-Jae, and Moon Sang-Jae. 2003. Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method. Journal of Internet Computing and Services, 4, 3, (2003), 1-8.