Securing RSA Algorithm against Timing Attack

被引:0
|
作者
Arjunan, Amuthan [1 ]
Narayanan, Praveena
Ramu, Kaviarasan
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
关键词
Cryptanalysis; side channel attacks; timing attack; RSA; OAEP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis is known as side channel cryptanalysis and attacks performed by using this method is known side channel attacks. There are different types of side channel attacks based on side channel information like time, power, electromagnetic information and faulty output emitted from the cryptographic devices during implementation. The attack that occurs based on the run-time by which the information gained from physical characteristics of cryptosystems to retrieve the secret key is known as the timing attack. The side channel attacks are vulnerable to both symmetric and asymmetric algorithms. RSA is an asymmetric algorithm which plays an important role in most of the applications, but this algorithm is vulnerable to timing attack. So a new technique is proposed called "Randomness Algorithm" and Optical Asymmetric Encryption Padding (OAEP) technique to improve the robustness of RSA algorithm against timing attack, by introducing randomness in computation of decryption process to make the timing information unusable to the attacker.
引用
收藏
页码:471 / 476
页数:6
相关论文
共 50 条
  • [1] Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm
    Chen, Caisen
    Xiang, Yangxia
    DengLiu, Yuqin
    Zhou, Zeyun
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2016, 8 (02) : 88 - 95
  • [2] A timing attack against RSA with the Chinese remainder theorem
    Schindler, W
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 109 - 124
  • [3] Research on trace driven data cache timing attack against RSA
    Chen, Cai-Sen
    Wang, Tao
    Guo, Shi-Ze
    Zhou, Ping
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 1039 - 1051
  • [4] More detail for a combined timing and power attack against implementations of RSA
    Schindler, W
    Walter, CD
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 245 - 263
  • [5] More detail for a combined timing and power attack against implementations of RSA
    Schindler, Werner
    Walter, Colin D.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2898 : 245 - 263
  • [6] Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm
    de la Fe, Sadiel
    Park, Han-Byeol
    Sim, Bo-Yeon
    Han, Dong-Guk
    Ferrer, Carles
    INFORMATION, 2021, 12 (11)
  • [7] A Timing Attack against Patterson Algorithm in the McEliece PKC
    Shoufan, Abdulhadi
    Strenzke, Falko
    Molter, H. Gregor
    Stoettinger, Marc
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 161 - +
  • [8] A practical timing attack on RSA over a LAN
    Lodato, Mark J.
    Jouny, Ismail
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [9] Securing the Internet against attack
    Goth, G
    IEEE INTERNET COMPUTING, 2003, 7 (01) : 8 - 10
  • [10] An improved data cache timing attack against RSA based on hidden Markov model
    Chen, Cai-sen
    Xiang, Yang-xia
    Du, Jia-xing
    Cheng, Zhiwei
    Journal of Computers (Taiwan), 2019, 30 (01) : 87 - 95