Using Randomization in Exponentiation Based Algorithms against Power Analysis Attacks

被引:0
作者
Mahanta, Hridoy Jyoti [1 ]
Khan, Ajoy Kumar [1 ]
机构
[1] Assam Univ, Dept Comp Sci & Engn, Silchar, Assam, India
来源
2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM) | 2016年
关键词
power analysis; DPA; CRT; countermeasures; randomization; masking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Power analysis attacks uses the intermediate power consumption details of a cryptosystem to retrieve the secret key used. In order to resist such attack there can be mainly two possibilities, first is to make the system so secure that its power consumption details do not leave any trace for the attacker. The second is to make the system work in such a way that power consumption detail will be independent of the intermediate values. The first approach is quite difficult to achieve, however the second approach has proved to be effective in many consequences. Randomizing the operations of a cryptosystem has been quite widely used from some years back as it prevents power consumption details from revealing the exact intermediate values. In this paper we try to investigate the various ways in which randomization has been applied in exponentiation based cryptosystems to resist power analysis attacks.
引用
收藏
页数:5
相关论文
共 50 条
[21]   Experiments on Two Clock Countermeasures Against Power Analysis Attacks [J].
Menicocci, Renato ;
Trifiletti, Alessandro ;
Trotta, Francesco .
2014 PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS & SYSTEMS (MIXDES), 2014, :215-219
[22]   A State Machine Encoding Methodology Against Power Analysis Attacks [J].
Richa Agrawal ;
Ranga Vemuri ;
Mike Borowczak .
Journal of Electronic Testing, 2019, 35 :621-639
[23]   Random Interleaved Pipeline Countermeasure Against Power Analysis Attacks [J].
Menicocci, Renato ;
Trifiletti, Alessandro ;
Trotta, Francesco .
2013 9TH CONFERENCE ON PH. D. RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME 2013), 2013, :145-148
[24]   A State Machine Encoding Methodology Against Power Analysis Attacks [J].
Agrawal, Richa ;
Vemuri, Ranga ;
Borowczak, Mike .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (05) :621-639
[25]   Design and verification of improved CMERE against power analysis attacks [J].
Mahanta H.J. ;
Chakraborty A. ;
Khan A.K. .
Cyber-Physical Systems, 2020, 6 (03) :165-179
[26]   Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks [J].
Ashok, Prathiba ;
Somasundaram, Kanchana Bhaaskaran Vettuvanam .
IET INFORMATION SECURITY, 2019, 13 (06) :692-702
[27]   Resisting HODPA attacks in modular exponentiation using inner product with differential evolution [J].
Hridoy Jyoti Mahanta ;
Ajoy Kumar Khan ;
Somnath Mukhopadhyay .
Innovations in Systems and Software Engineering, 2021, 17 :53-62
[28]   Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem [J].
Lee, Mun-Kyu ;
Song, Jeong Eun ;
Choi, Dooho ;
Han, Dong-Guk .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) :153-163
[29]   Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks [J].
Ansari, Nadia Mustaqim ;
Hussain, Rashid ;
Arif, Sheeraz ;
Hussain, Syed Sajjad .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01) :1861-1875
[30]   An overview of power analysis attacks against field programmable gate arrays [J].
Standaert, FX ;
Peeters, E ;
Rouvroy, G ;
Quisquater, JJ .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :383-394