Efficient Leak Resistant Modular Exponentiation in RNS

被引:3
作者
Lesavourey, Andrea [1 ,2 ,3 ]
Negre, Christophe [1 ,2 ,3 ]
Plantard, Thomas [4 ]
机构
[1] Univ Perpignan, Team DALI, Perpignan, France
[2] Univ Montpellier, LIRMM, Perpignan, France
[3] CNRS, Perpignan, France
[4] Univ Wollongong, SCIT, CCISR, Wollongong, NSW, Australia
来源
2017 IEEE 24TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH) | 2017年
关键词
RSA; modular exponentiation; randomization; side channel analysis; RNS;
D O I
10.1109/ARITH.2017.39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The leak resistant arithmetic in RNS was introduced in 2004 to randomize RSA modular exponentiation. This randomization is meant to protect implementations on embedded device from side channel analysis. We propose in this paper a faster version of the approach of Bajard et al. in the case of right-to-left square-and-multiply exponentiation. We show that this saves roughly 30% of the computation when the randomization is done at each loop iteration. We also show that the level of randomization of the proposed approach is better than the one of Bajard et al. after a few number of loop iterations.
引用
收藏
页码:156 / 163
页数:8
相关论文
共 15 条
[1]   A full RNS implementation of RSA [J].
Bajard, JC ;
Imbert, L .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) :769-774
[2]  
Bajard JC, 2004, LECT NOTES COMPUT SC, V3156, P62
[3]   Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC [J].
Bigou, Karim ;
Tisserand, Arnaud .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :123-140
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[6]   A general approach for improving RNS Montgomery exponentiation using pre-processing [J].
Gandino, Filippo ;
Lamberti, Fabrizio ;
Montuschi, Paolo ;
Bajard, Jean-Claude .
2011 20TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH-20), 2011, :195-204
[7]  
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291
[8]  
Kawamura S, 2000, LECT NOTES COMPUT SC, V1807, P523
[9]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]  
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104