Comment Nobody uses binary exponentiation (Score 2, Interesting) 108
Hi,
This paper is based on the wrong assumption that the algorithm that is used is binary exponentiation. This is false as every single respectable implementation uses N-ary multiplication or sliding windows in the worst case scenario. In both of these cases, the attack as shown in the paper would only be able to predict minimal information.
Also, the claimed statement that you can do nothing with this type of attack is completely false (even in the case of binary exponentiation.) Just do this:
- If you have a 1, do as usual
- If you have a 0, do as in the case you have a 1, but ignore the last value, and use the result of the squaring.
Regards,
LG