Self-randomized exponentiation algorithms

被引:0
作者
Chevallier-Mames, B [1 ]
机构
[1] Gemplus, Card Secur Grp, F-13705 La Ciotat, France
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS | 2004年 / 2964卷
关键词
exponentiation; implementation attacks; fault attacks; sidechannel attacks (DPA; SPA); randomization; exponent masking; blinding; RSA; standard mode; smart cards;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficient means for preventing DPA-type attacks. Self-randomized exponentiation features several interesting properties: it is fully generic in the sense that it is not restricted to a particular exponentiation algorithm, it is parameterizable: a parameter allows to choose the best trade-off between security and performance; it can be combined with most other counter-measures; it is space-efficient as only an additional long-integer register is required; it is flexible in the sense that it does not rely on certain group properties; it does not require the prior knowledge of the order of the group in which the exponentiation is performed. All these advantages make our method particularly well suited to secure implementations of the RSA cryptosystem in standard mode, on constrained devices like smart cards.
引用
收藏
页码:236 / 249
页数:14
相关论文
共 20 条
[1]  
[Anonymous], 2001, P NUMBER GENERATORS
[2]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[3]  
Bellare M., 1995, LNCS, V950, P92, DOI [DOI 10.1007/BFB0053428, 10.1007/BFb0053428]
[4]   On the importance of eliminating errors in cryptographic computations [J].
Boneh, D ;
DeMillo, RA ;
Lipton, RJ .
JOURNAL OF CRYPTOLOGY, 2001, 14 (02) :101-119
[5]  
BONEH D, 1999, NOT AM MATH SOC, V46, P203
[6]  
Chari S., 1999, LECT NOTES COMPUTER, V1666, P398, DOI [10.1007/3-540-48405-1_26, DOI 10.1007/3-540-48405-1_26]
[7]  
CHEVALLIERMAMES B, IN PRESS LOW COST SO
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Itoh K, 2002, LECT NOTES COMPUT SC, V2523, P303
[10]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5