Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation

被引:9
作者
Mahanta, Hridoy Jyoti [1 ]
Khan, Ajoy Kumar [1 ]
机构
[1] Assam Univ, Dept Comp Sci & Engn, Silchar, India
关键词
public key cryptography; RSA; power analysis attacks; nonuniform exponent partitioning; Fisher Yates method; modular exponentiation; modulo operation; shuffling method; Chinese remainder theorem; public key cryptosystem;
D O I
10.1049/iet-ifs.2016.0508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents an approach to compute randomised modular exponentiation through non-uniform exponent partitioning. The exponent has been first partitioned into multiple parts and then shuffled by Fisher Yates method. Thereafter, every partition randomly computes modular exponentiation followed by a final modulo operation to generate the desired result. The shuffling has been introduced to randomise the execution order of individual modular exponentiation. This work is implemented in Rivest-Shamir-Adleman (RSA) and Chinese remainder theorem RSA as they are modular exponentiation based public key cryptosystems. The results have been analysed during decryption with different key sizes. The results indicate that the proposed work can generate non-uniform partitions of the exponent which could not be easily anticipated even in multiple iterations. Also, the shuffling method could completely randomise the execution order of modular exponentiation operations. With non-uniform exponent partitions and randomised modular exponentiation, the proposed work could challenge all the variances of power analysis attacks.
引用
收藏
页码:25 / 33
页数:9
相关论文
共 35 条
  • [1] Ade-Ibijola A. O., 2012, Int. J. Comput. Appl., V54, P24
  • [2] Akalp Kuzu E, 2013, IEEE INT ADV COMPUT, P138
  • [3] Amiel F, 2007, LECT NOTES COMPUT SC, V4876, P110
  • [4] [Anonymous], IACR CRYPTOLOGY EPRI
  • [5] Bauer Aurelie, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P98, DOI 10.1007/978-3-319-03515-4_7
  • [6] Bauer Sven, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P82, DOI 10.1007/978-3-642-29912-4_7
  • [7] Black P.E., 2005, Dictionary of algorithms and data structures
  • [8] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [9] den Boer B, 2002, LECT NOTES COMPUT SC, V2523, P228
  • [10] Fouque PA, 2003, LECT NOTES COMPUT SC, V2779, P254, DOI 10.1007/978-3-540-45238-6_21