Securing RSA Algorithm against Timing Attack

被引:0
|
作者
Arjunan, Amuthan [1 ]
Narayanan, Praveena
Ramu, Kaviarasan
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
关键词
Cryptanalysis; side channel attacks; timing attack; RSA; OAEP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis is known as side channel cryptanalysis and attacks performed by using this method is known side channel attacks. There are different types of side channel attacks based on side channel information like time, power, electromagnetic information and faulty output emitted from the cryptographic devices during implementation. The attack that occurs based on the run-time by which the information gained from physical characteristics of cryptosystems to retrieve the secret key is known as the timing attack. The side channel attacks are vulnerable to both symmetric and asymmetric algorithms. RSA is an asymmetric algorithm which plays an important role in most of the applications, but this algorithm is vulnerable to timing attack. So a new technique is proposed called "Randomness Algorithm" and Optical Asymmetric Encryption Padding (OAEP) technique to improve the robustness of RSA algorithm against timing attack, by introducing randomness in computation of decryption process to make the timing information unusable to the attacker.
引用
收藏
页码:471 / 476
页数:6
相关论文
共 50 条
  • [41] Cache-Timing Attack Against HQC
    Huang S.
    Sim R.Q.
    Chuengsatiansup C.
    Guo Q.
    Johansson T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 136 - 163
  • [42] Side-Channel Attack against RSA Key Generation Algorithms
    Bauer, Aurelie
    Jaulmes, Eliane
    Lomne, Victor
    Prouff, Emmanuel
    Roche, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 223 - 241
  • [43] Side-channel attack against RSA key generation algorithms
    Bauer, Aurélie
    Jaulmes, Eliane
    Lomné, Victor
    Prouff, Emmanuel
    Roche, Thomas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 223 - 241
  • [44] A DPA attack against the modular reduction within a CRT implementation of RSA
    den Boer, B
    Lemke, K
    Wicke, G
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 228 - 243
  • [45] Server-aided RSA key generation against collusion attack
    Chen, Yun
    Safavi-Naini, Reihaneh
    Baek, Joonsang
    Chen, Xin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 27 - 37
  • [46] Securing QR codes by RSA on FPGA
    Gupta, Priyanka
    Saini, Sandeep
    Lata, Kusum
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2289 - 2295
  • [47] A RSA key security gradating algorithm based on threshold attack time
    Tan W.
    Xi J.
    Wang X.
    Journal of Software, 2011, 6 (09) : 1873 - 1880
  • [48] Improving timing attack on RSA-CRT via error detection and correction strategy
    Chen, CaiSen
    Wang, Tao
    Tian, Junjian
    INFORMATION SCIENCES, 2013, 232 : 464 - 474
  • [49] Wagner's attack on a secure CRT-RSA algorithm reconsidered
    Bloemer, Johannes
    Otto, Martin
    FAULT DIAGNOISIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 : 13 - 23
  • [50] Difference timing attack against AES based on cache timing character
    Deng, Gaoming
    Zhang, Peng
    Zhao, Qiang
    Liu, Xiaoqin
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2008, 33 (10): : 1088 - 1091