Using Randomization in Exponentiation Based Algorithms against Power Analysis Attacks

被引:0
|
作者
Mahanta, Hridoy Jyoti [1 ]
Khan, Ajoy Kumar [1 ]
机构
[1] Assam Univ, Dept Comp Sci & Engn, Silchar, Assam, India
来源
2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM) | 2016年
关键词
power analysis; DPA; CRT; countermeasures; randomization; masking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Power analysis attacks uses the intermediate power consumption details of a cryptosystem to retrieve the secret key used. In order to resist such attack there can be mainly two possibilities, first is to make the system so secure that its power consumption details do not leave any trace for the attacker. The second is to make the system work in such a way that power consumption detail will be independent of the intermediate values. The first approach is quite difficult to achieve, however the second approach has proved to be effective in many consequences. Randomizing the operations of a cryptosystem has been quite widely used from some years back as it prevents power consumption details from revealing the exact intermediate values. In this paper we try to investigate the various ways in which randomization has been applied in exponentiation based cryptosystems to resist power analysis attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A randomised scheme for secured modular exponentiation against power analysis attacks
    Barman M.
    Mahanta H.J.
    Cyber-Physical Systems, 2019, 5 (04): : 209 - 230
  • [2] A Randomization Based Computation of RSA to Resist Power Analysis Attacks
    Mahanta, Hridoy Jyoti
    Ahmed, Sibbir
    Khan, Ajoy Kumar
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 328 - 331
  • [3] Comparative Modular Exponentiation with Randomized Exponent to Resist Power Analysis Attacks
    Hridoy Jyoti Mahanta
    Ajoy Kumar Khan
    Arabian Journal for Science and Engineering, 2017, 42 : 3423 - 3434
  • [4] Comparative Modular Exponentiation with Randomized Exponent to Resist Power Analysis Attacks
    Mahanta, Hridoy Jyoti
    Khan, Ajoy Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) : 3423 - 3434
  • [5] A Cluster Correlation power analysis against double blinding exponentiation
    Wan, Wunan
    Chen, Jun
    Zhang, Shibing
    Xia, Jinyue
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [6] Securing AES Designs Against Power Analysis Attacks: A Survey
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    Ahamed, Shaik Rafi
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (16) : 14332 - 14356
  • [7] Randomized scalar multiplication algorithm against power analysis attacks
    Liu, Hongming, 1600, Binary Information Press (10): : 7787 - 7796
  • [8] Randomized execution algorithms for smart cards to resist power analysis attacks
    Zhang, Daigu
    Liao, Xiaofeng
    Qiu, Meikang
    Hu, Jingtong
    Sha, Edwin H. -M.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2012, 58 (10) : 426 - 438
  • [9] Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis
    Mozipo, Aurelien T.
    Acken, John M.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5128 - 5142
  • [10] Resisting HODPA attacks in modular exponentiation using inner product with differential evolution
    Mahanta, Hridoy Jyoti
    Khan, Ajoy Kumar
    Mukhopadhyay, Somnath
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2021, 17 (01) : 53 - 62