DPA Countermeasures by Improving the Window Method Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Fujitsu Laboratories LTD.
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Contents What is DPA? Previous DPA countermeasures Our DPA countermeasures Security of our countermeasures Performance comparison with other countermeasures
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Overview Fast encryption speed No additional parameter Applicable in both RSA and ECC Proposal of new effective DPA countermeasure(s) for public key cryptosystems Characteristics Objectives
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) What is DPA? (Differential Power Analysis) Analyze a secret key stored in the cryptographic device by monitoring its power consumption. (Kocher, CRYPTO’99) スマートカード 秘密情報 Make a differential t V t V Smartcard Secret key K Plaintext P i (i=1,2,...,N) Analyze Secret key K Monitor a power consumption
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Previous DPA Countermeasures for public key Cryptosystems Randomization of the private exponent (Coron, CHES’99) Randomized binary-method (Messerges-Dabbish-Sloan, CHES’99) Randomized projective coordinates (Coron, CHES’99) Exponent splitting (Clavier-Joye, CHES2001) d d’ = d+r ( r :random, :order) d = d 1 + d 2, a d = a d 1 a d 2 (mod n), ( d 1,d 2 :random) (x,y) (x r, y r, z r) ( r :random) d = randomly choose MSB-to-LSB binary-method LSB-to-MSB binary-method
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Demerits of Previous DPA Countermeasures Slow encryption speed (Clavier-Joye, Messerges) Not applicable to both RSA and ECC(Coron) Additional parameter is required(Coron) Exponent splitting technique takes 2 times computation. Randomized projective coordinates technique is available only in ECC. When randomizing the private exponent, parameter is used. RSA (normal) replace... a, d, n a d (mod n) RSA (DPA protected) a d (mod n) a, d, n
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Merits of Our Countermeasures Fast encryption speed (Overhead is low) Applicable to both RSA and ECC No additional parameter In comparison with k-ary method, computational complexity is 105% in 1024-bit RSA, and is 119% in 160-bit ECC Vulnerable encrypt engine is easily replaced to secure one All countermeasures are based on the window method
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Our DPA Countermeasures We propose 3 countermeasures: Overlapping Window Method(O-WM) Randomized Table Window Method(RT-WM) Hybrid Randomizing Window Method(HR-WM) Each has unique characteristics (speed, security) A suitable countermeasure can be chosen according to the environment (encryption algorithm, key length...)
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Overlapping Window Method(O-WM) Data is randomized. Basic idea d w0w0 w1w1 w2w2 Traditional WM d w0w0 w1w1 w2w d w0w0 w1w1 w2w By overlapping w i and w i+1, various expressions are possible.
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Data is randomized. Basic idea d w0w0 w1w1 w2w2 Traditional WM 1 d RT-WM a 000 a 001 a 010 a 011 a 100 a 101 a 110 a 111 a r a r a r a r a r a r a r a r w0w0 w1w1 w2w r:r: Table lookup: Randomize Randomized Table Window Method (RT-WM) (random)
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Hybrid Randomizing Window Method (HR-WM) HR-WM = O-WM + RT-WM = (Overlapping) + (Randomized Table) d 1 a r a r a r a r a r a r a r a r w0w0 w1w1 w2w Randomized table r (random) : Overlapping window
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Security Evaluation of Our Countermeasures Basic idea without countermeasureUsing countermeasure Size of the spike will be smaller by the countermeasure Security is evaluated by the ratio of the sizes. (attenuation ratio = B/A) A B
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) DPA Attack Experiment RSA(Normal) attenuation ratio=1/10 RSA(O-WM)
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Security Evaluation Result RSA ECC(2D) ECC(3D) O-WM ~ ( * ) ~2 -80 ( * ) RT-WM HR-WM ~2 -61 ( * ) ECC(2D) : An implementation using affine coordinates ECC(3D) : An implementation using projective or Jacobian coordinates Attenuation Ratio(AR) for a fixed parameter ( * ) : The reason why AR varies, is described in the paper
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Performance Comparison among Our Countermeasures O-WMRT-WM Suitable for ECC (3D) Suitable for RSA HR-WM O-WMHR-WMRT-WM ECC(3D) (160-bit) TIME AR~2 -80 ~ RSA (1024- bit) TIME AR~ Shorter key length Longer key length TIME:number of addition/doubling(ECC) or multiplication/squaring(RSA) 210-bit 340-bit 160-bit1024-bit
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Comparison with Other Countermeasures TIME:number of addition/doubling(ECC) or multiplication/squaring(RSA) O-WMHR-WMRT-WMCoronMesserges ECC( 3D ) (160-bit) TIME AR ~2 -80 ~ RSA (1024- bit) TIME AR ~ Additional Parameter No YesNo vs Coron : Additional parameter is unnecessary vs Messerges : Much higher security in ECC, higher security and 13% faster in RSA Proposed and Coron : 4-bit window, Messerges : binary-method(RSA) or signed-binary(ECC)
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Conclusion We evaluated the security by attenuation ratio Fast encryption speed Applicable to both RSA and ECC No Additional parameter We proposed new DPA countermeasures, O-WM, RT-WM and HR-WM ECC : All countermeasures provide enough security RSA : RT-WM and HR-WM provide enough security
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002)
All Rights Reserved. Copyright (C) Fujitsu Laboratories LTD.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) Questions & Comments