Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks

被引:2
|
作者
Perin, Guilherme [1 ]
Imbert, Laurent [1 ]
Torres, Lionel [1 ]
Maurine, Philippe [1 ]
机构
[1] LIRMM UM2, F-34095 Montpellier, France
关键词
RSA; RNS; Montgomery exponentiation; Countermeasures; Electromagnetic analysis; POWER ANALYSIS;
D O I
10.1007/978-3-319-08302-5_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures. Because the architecture can leak information through control and memory executions, the hardware RNS-RSA also relies on the randomization of RAM accesses. Experimental results, obtained with and without randomization of the RNS moduli sets, suggest that the RNS-based RSA with bases randomization and secured RAM accesses is protected.
引用
收藏
页码:200 / 215
页数:16
相关论文
共 50 条
  • [31] Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
    Spence, Aaron
    Bangay, Shaun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (03) : 437 - 453
  • [32] Security Analysis of Raspberry Pi Against Side-Channel Attack with RSA Cryptography
    Sanada, Akihiro
    Nogami, Yasuyuki
    Iokibe, Kengo
    Khandaker, Md. Al-Amin
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [33] Side-Channel Attack against RSA Key Generation Algorithms
    Bauer, Aurelie
    Jaulmes, Eliane
    Lomne, Victor
    Prouff, Emmanuel
    Roche, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 223 - 241
  • [34] A Study of Timing Side-Channel Attacks and Countermeasures on Java']JavaScript and WebAssembly
    Mazaheri, Mohammad Erfan
    Sarmadi, Siavash Bayat
    Ardakani, Farhad Taheri
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 1 - 20
  • [35] Survey of Side-channel Attacks and Countermeasures on Post-quantum Cryptography
    Wu W.-B.
    Liu Z.
    Yang H.
    Zhang J.-P.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 1165 - 1185
  • [36] Defense against Side-Channel Power Analysis Attacks on Microelectronic Systems
    Sundaresan, Vijay
    Rammohan, Srividhya
    Vemuri, Ranga
    NAECON 2008 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2008, : 144 - 150
  • [37] Side-channel attack against RSA key generation algorithms
    Bauer, Aurélie
    Jaulmes, Eliane
    Lomné, Victor
    Prouff, Emmanuel
    Roche, Thomas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 223 - 241
  • [38] Combining Clock and Voltage Noise Countermeasures against Power Side-Channel Analysis
    Lagasse, Jacqueline
    Bartoli, Christopher
    Burleson, Wayne
    2019 IEEE 30TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2019), 2019, : 214 - 217
  • [39] POSTER: Is Active Electromagnetic Side-channel Attack Practical?
    Wakabayashi, Satohiro
    Maruyama, Seita
    Mori, Tatsuya
    Goto, Shigeki
    Kinugawa, Masahiro
    Hayashi, Yu-ichi
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2587 - 2589
  • [40] Synthesis of Masking Countermeasures against Side Channel Attacks
    Eldib, Hassan
    Wang, Chao
    COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 114 - 130