A Hole in the Ladder: Interleaved Variables in Iterative Conditional Branching (Extended Version)

03/08/2021
by   Yoann Marquer, et al.
0

The iterative conditional branchings appear in various sensitive algorithms, like the modular exponentiation in the RSA cryptosystem or the scalar multiplication in ellipticcurve cryptography. In this paper, we abstract away the desirable security properties achieved by the Montgomery ladder, and formalize systems of equations necessary to obtain what we call the semi-interleaved and fully-interleaved ladder properties. This fruitful approach allows us to design novel fault-injection attacks, able to obtain some/all bits of the secret against different ladders, including the common Montgomery ladder. We also demonstrate the generality of our approach by applying the ladder equations to the modular exponentiation and the scalar multiplication, both in the semi-and fully-interleaved cases, thus proposing novel and more secure algorithms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/28/2022

Categorical composable cryptography: extended version

We formalize the simulation paradigm of cryptography in terms of categor...
research
01/15/2018

A Multi-layer Recursive Residue Number System

We present a method to increase the dynamical range of a Residue Number ...
research
02/04/2020

A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes

A fault injection framework for the decryption algorithm of the Niederre...
research
01/25/2018

A New Algorithm for Double Scalar Multiplication over Koblitz Curves

Koblitz curves are a special set of elliptic curves and have improved pe...
research
06/28/2023

Proving Confluence in the Confluence Framework with CONFident

This article describes the *Confluence Framework*, a novel framework for...
research
09/08/2020

Quad-Core RSA Processor with Countermeasure Against Power Analysis Attacks

Rivest-Shamir-Adleman (RSA) cryptosystem uses modular multiplication for...
research
07/10/2020

Microarchitecture Online Template Attacks

Online template attack (OTA) is a powerful technique previously used to ...

Please sign up or login with your details

Forgot password? Click here to reset