Power analysis attack: A vulnerability to smart card security

Author(s):  
Hridoy Jyoti Mahanta ◽  
Abul Kalam Azad ◽  
Ajoy Kumar Khan
2002 ◽  
Vol 51 (5) ◽  
pp. 541-552 ◽  
Author(s):  
T.S. Messerges ◽  
E.A. Dabbish ◽  
R.H. Sloan

Author(s):  
Huiyun Li ◽  
Keke Wu ◽  
Bo Peng ◽  
Yiwei Zhang ◽  
Xinjian Zheng ◽  
...  

2016 ◽  
Vol 67 (1) ◽  
pp. 85-92 ◽  
Author(s):  
Tomáš Fabšič ◽  
Ondrej Gallo ◽  
Viliam Hromada

Abstract It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix P by measuring the power consumption. We demonstrate that a similar threat is present in the QC-LDPC variant of the McEliece cryptosystem. We consider a naive implementation of the decryption algorithm in the QC-LDPC McEliece cryptosystem. We demonstrate that this implementation leaks information about positions of ones in the secret matrix Q. We argue that this leakage allows an attacker to completely recover the matrix Q. In addition, we note that the quasi-cyclic nature of the matrix Q allows to accelerate the attack significantly.


Author(s):  
Kostas Markantonakis ◽  
Keith Mayes ◽  
Michael Tunstall ◽  
Damien Sauveron ◽  
Fred Piper

Sign in / Sign up

Export Citation Format

Share Document