A secured modular exponentiation for rsa and crt-rsa with dual blinding to resist power analysis attacks

被引:0
作者
Mahanta H.J. [1 ]
Khan A.K. [1 ]
机构
[1] Department of Computer Science and Engineering, Assam University, Silchar, Assam
关键词
Blinding; Modular exponentiation; Power analysis attacks; Public key cryptography; Rsa; Security;
D O I
10.1504/IJICS.2020.105187
中图分类号
学科分类号
摘要
Blinding has been one of the most effective approaches to resist power analysis attacks on asymmetric cryptosystems like RSA. Blinding is similar to masking in symmetric cryptosystems, but masking can be implemented in various ways like Boolean, affine, polynomial masking, etc. However, for asymmetric cryptosystems with modular exponentiation as a fundamental operation, arithmetic masking or simply blinding has been extremely popular. In this paper, we have presented a secured approach for modular exponentiation in RSA and CRT-RSA cryptosystems with dual blinding. Through dual blinding, we have masked both secret exponent and message twice before executing the fundamental operations. We have also injected two ineffectual instructions between the fundamental operations and blinded the intermediate results to felicitate hiding and resist simple power analysis. The implementation results shows that with a nominal penalty, RSA and CRT-RSA with dual blinding can effectively resist some popular simple power analysis and differential power analysis attacks to a significant extent. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:112 / 129
页数:17
相关论文
共 29 条
  • [21] Messerges T.S., Dabdish E.A., Sloan R.H., Power analysis attacks of modular exponentiation in smartcards, CHES, 99, pp. 144-157, (1999)
  • [22] Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
  • [23] Schindler W., Itoh K., Exponent blinding does not always lift (partial) SPA resistance to higher-level security, Proceedings of International Conference on Applied Cryptography and Network Security, pp. 73-90, (2011)
  • [24] Schindler W., Wiemers A., Power attacks in the presence of exponent blinding, Journal of Cryptographic Engineering, 4, 4, pp. 213-236, (2014)
  • [25] Schindler W., Wiemers A., Generic power attacks on RSA with CRT and exponent blinding: New results, Journal of Cryptographic Engineering, 7, 4, pp. 1-18, (2017)
  • [26] Vuillaume C., Endo T., Wooderson P., RSA key generation: New attacks, Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 105-119, (2012)
  • [27] Witteman M.F., Van Woudenberg J.G., Menarini F., Defeating RSA multiply-Always and message blinding countermeasures, Proceedings of Cryptographers Track at the RSA Conference, pp. 77-88, (2011)
  • [28] Wan W., Yang W., Chen J., An optimized cross correlation power attack of message blinding exponentiation algorithms, China Communications, 12, 6, pp. 22-32, (2015)
  • [29] Zhao B., Wang L., Jiang K., Liang X., Shan W., Liu J., An improved power attack on small RSA public exponent, Proceedings of IEEE 12th International Conference on Computational Intelligence and Security, pp. 578-581, (2016)