A randomised scheme for secured modular exponentiation against power analysis attacks

被引:2
作者
Barman M. [1 ]
Mahanta H.J. [1 ]
机构
[1] Department of Computer Science and Engineering, Assam Don Bosco University, Guwahati, Assam
来源
Cyber-Physical Systems | 2019年 / 5卷 / 04期
关键词
CMOS; DPA; modular exponentiation; power analysis attacks; RSA;
D O I
10.1080/23335777.2019.1637944
中图分类号
学科分类号
摘要
This paper presents an approach to compute secured modular exponentiation to mitigate power analysis attacks. Two processes have been designed based on ‘multiply-always’ binary method, which injects dummy multiplications so that the original multiplications can remain intact. The two processes are being invoked based on a random variable, which generated either 0 or 1. With these randomised modular exponentiation, the proposed approach can resist simple and differential power analysis attacks to a large extent. The proposed approach has been implemented using conventional ‘squaring-multiplication’ and ‘Montgomery-Ladder’ methods. Further, the work has also been extended to CRT-RSA, which is widely used for fast computation. The proposed method has been implemented for different key sizes of 1024-bit, 1536-bit and 2048-bit RSA & CRT-RSA. The analysis and results show that with a complexity of O(n), the proposed approach can resist some of the standard DPA attacks on modular exponentiation. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:209 / 230
页数:21
相关论文
共 38 条
[1]  
Mangard S., Oswald E., Popp T., Power analysis attacks: revealing the secrets of smart cards, 31, (2008)
[2]  
Kocher P., Jaffe J., Jun B., Differential power analysis, Proceedings of the Advances in Cryptology, pp. 388-397, (1999)
[3]  
Anderson R., Kuhn M.G., Tamper resistance-a cautionary note, Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 18-21, (1996)
[4]  
Kommerling O., Kuhn M.G., Design principles for tamper-resistant smart card processors, Proceedings of the USENIX Workshop on Smart card Technology, pp. 10-11, (1999)
[5]  
Gammel B.M., Ruping J., Smart cards inside, Proceedings of the 31st European Solid-State Circuits Conference, pp. 69-74, (2005)
[6]  
Suman S., Sharma K.G., Ghosh P.K., Performance analysis of voltage-controlled ring oscillators, Proceedings of the International Congress on Information and Communication Technology, pp. 29-38, (2016)
[7]  
Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, Commun ACM, 21, 2, pp. 120-126, (1978)
[8]  
Biham E., Shamir A., Differential fault analysis of secret key cryptosystems, Proceedings of the Annual International Cryptology Conference, pp. 513-525, (1997)
[9]  
Bao F., Deng R.H., Han Y., Et al., Breaking public key cryptosystems in the presence of transient faults, Proceedings of the International Workshop on Security Protocols, pp. 115-124, (1997)
[10]  
Choi Y., Choi D., Lee H., Et al., An improved square-always exponentiation resistant to side-channel attacks on RSA implementation, Intell Autom Soft Comput, 22, 3, pp. 353-363, (2016)