An efficient algorithm for DPA-resistent RSA

被引:0
|
作者
Wang, Yi [1 ]
Leiwo, Jussipekka [1 ]
Srikanthan, Thambipillai [1 ]
Luo Jianwen [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Ctr High Performance Embedded Syst, Singapore 639798, Singapore
来源
2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS | 2006年
关键词
SPA; DPA; RSA; ECC; power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel attacks are a powerful method to recover sensitive data of smart cards or physical devices from timing, power and fault analysis etc. Currently, simple power analysis (SPA) and differential power analysis (DPA) are popular methods to attack hardware implementation of cryptographic algorithms based on hardware. RSA cryptosystem, use private key as exponent which is easily attacked by means of power analysis. Our paper shows that the attackers still can obtain some sensitive information even by using Kim's countermeasure due to the initial value. Furthermore, we propose a modified countermeasure for DPA-resistant RSA implementation and simulate the power analysis to illustrate our proposed algorithm.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
  • [1] Resistance DPA of RSA on Smartcard
    Jin, Ji-fang
    Lu, Er-hong
    Gao, Xian-wei
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 406 - +
  • [2] A DPA attack against the modular reduction within a CRT implementation of RSA
    den Boer, B
    Lemke, K
    Wicke, G
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 228 - 243
  • [3] An efficient implementation of RSA digital signature algorithm
    Fu, Chong
    Jiang, Huiyan
    Li, Hui
    Zhu, Weiyong
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 143 - 147
  • [4] An Efficient Implementation of RSA Digital Signature Algorithm
    Fu, Chong
    Zhu, Zhi-liang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12509 - +
  • [5] A Robust Algorithm for DPA-resistant ECC
    Wang, Yi
    Douglas, L. Maskell
    PROCEEDINGS OF THE 2009 12TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC 2009), 2009, : 663 - +
  • [6] An efficient algorithm resistant to SPA and DPA variants in ECC
    Meshgi, Hadi
    Khazaee, Mohammad Erfan
    Kasiri, Behzad
    Shahhoseini, Hadi Shahriar
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 290 - +
  • [7] An Efficient Signature System Using Optimized RSA Algorithm
    El-Sayed, Rania Salah
    Abd El-Aziem, Moustafa
    Gomaa, Mohammad Ali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 343 - 348
  • [8] Rsa meets dpa: Recovering rsa secret keys from noisy analog data
    Kunihiro, Noboru
    Honda, Junya
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 261 - 278
  • [9] RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
    Kunihiro, Noboru
    Honda, Junya
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 261 - 278
  • [10] A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction
    Lien, Wei-Chih
    Yen, Sung-Ming
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 354 - 364