A secured modular exponentiation for rsa and crt-rsa with dual blinding to resist power analysis attacks

被引:0
作者
Mahanta H.J. [1 ]
Khan A.K. [1 ]
机构
[1] Department of Computer Science and Engineering, Assam University, Silchar, Assam
关键词
Blinding; Modular exponentiation; Power analysis attacks; Public key cryptography; Rsa; Security;
D O I
10.1504/IJICS.2020.105187
中图分类号
学科分类号
摘要
Blinding has been one of the most effective approaches to resist power analysis attacks on asymmetric cryptosystems like RSA. Blinding is similar to masking in symmetric cryptosystems, but masking can be implemented in various ways like Boolean, affine, polynomial masking, etc. However, for asymmetric cryptosystems with modular exponentiation as a fundamental operation, arithmetic masking or simply blinding has been extremely popular. In this paper, we have presented a secured approach for modular exponentiation in RSA and CRT-RSA cryptosystems with dual blinding. Through dual blinding, we have masked both secret exponent and message twice before executing the fundamental operations. We have also injected two ineffectual instructions between the fundamental operations and blinded the intermediate results to felicitate hiding and resist simple power analysis. The implementation results shows that with a nominal penalty, RSA and CRT-RSA with dual blinding can effectively resist some popular simple power analysis and differential power analysis attacks to a significant extent. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:112 / 129
页数:17
相关论文
共 29 条
  • [1] Aldaya A.C., Marquez R.C., Sarimento A.J.C., Sanchez-Solano S., Side-channel analysis of the modular inversion step in the RSA key generation algorithm, International Journal of Circuit Theory and Applications, 45, 2, pp. 199-213, (2016)
  • [2] Ambrose J.A., Ragel R.G., RIJID random code injection to mask power analysis based side channel attacks, Proceedings of 44th ACM/IEEE Design Automation Conference, pp. 489-492, (2007)
  • [3] Ambrose J.A., Ragel R.G., Parameswaran S., A smart random code injection to mask power analysis based side channel attacks, Proceedings of the 5th IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis, pp. 51-56, (2007)
  • [4] Ambrose J.A., Ragel R.G., Parameswaran S., Randomized instruction injection to counter power analysis attacks, ACM Transactions on Embedded Computing Systems, 11, 3, pp. 69-97, (2012)
  • [5] Bauer A., Jaulmes E., Correlation Analysis against Protected SFM Implementations of RSA, Proceedings of INDOCRYPT, pp. 98-115, (2013)
  • [6] Bauer S., Attacking exponent blinding in RSA without CRT, Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 82-88, (2012)
  • [7] Chari S., Rao J.R., Rohatgi P., Template attacks, CHES 2002, pp. 13-28, (2002)
  • [8] Choi Y., Choi D., Lee H., Ha J., An improved square-Always exponentiation resistant to side-channel attacks on RSA implementation, Intelligent Automation & Soft Computing, 22, 3, pp. 353-363, (2016)
  • [9] Fournaris A.P., Koufopavlou O., Protecting CRT RSA against fault and power side channel attacks, Proceedings of IEEE Computer Society Annual Symposium on VLSI, pp. 159-164, (2012)
  • [10] Frouque P.A., Kunz-Jacques S., Martinet G., Muller F., Valette F., Power attack on small RSA public exponent, CHES 2006, pp. 339-353, (2006)