An efficient algorithm for DPA-resistent RSA

被引:0
作者
Wang, Yi [1 ]
Leiwo, Jussipekka [1 ]
Srikanthan, Thambipillai [1 ]
Luo Jianwen [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Ctr High Performance Embedded Syst, Singapore 639798, Singapore
来源
2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS | 2006年
关键词
SPA; DPA; RSA; ECC; power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel attacks are a powerful method to recover sensitive data of smart cards or physical devices from timing, power and fault analysis etc. Currently, simple power analysis (SPA) and differential power analysis (DPA) are popular methods to attack hardware implementation of cryptographic algorithms based on hardware. RSA cryptosystem, use private key as exponent which is easily attacked by means of power analysis. Our paper shows that the attackers still can obtain some sensitive information even by using Kim's countermeasure due to the initial value. Furthermore, we propose a modified countermeasure for DPA-resistant RSA implementation and simulate the power analysis to illustrate our proposed algorithm.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
[21]   Generalized MMM-algorithm secure against SPA, DPA, and RPA [J].
Miyaji, Atsuko .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 :282-296
[22]   Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security [J].
Bansal, Malti ;
Gupta, Shubham ;
Mathur, Siddhant .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, :1340-1343
[23]   Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm [J].
Jaspin, K. ;
Selvan, Shirley ;
Sahana, S. ;
Thanmai, G. .
2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, :791-796
[24]   An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method [J].
Saxena, Sapna ;
Kapoor, Bhanu .
SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, :850-854
[25]   Efficient Hardware Implementation of RSA Cryptography [J].
Rahman, Mostafizur ;
Rokon, Iqbalur Rahman ;
Rahman, Miftahur .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, :316-319
[26]   Efficient generation of shared RSA keys [J].
Boneh, D ;
Franklin, M .
ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 :425-439
[27]   Efficient generation of shared RSA keys [J].
Boneh, D ;
Franklin, M .
JOURNAL OF THE ACM, 2001, 48 (04) :702-722
[28]   Implementation of the RSA Algorithm on a DataFlow Architecture [J].
Bezanic, Nikola ;
Popovic-Bozovic, Jelena ;
Milutinovic, Veljko ;
Popovic, Ivan .
IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2013, 9 (02) :11-16
[29]   An Improved Exponentiation Algorithm for RSA Cryptosystem [J].
Sepahvandi, S. ;
Hosseinzadeh, M. ;
Navi, K. ;
Jalali, A. .
2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, :128-+
[30]   Key Generation Algorithm Design Combination of RSA and ElGamal Algorithm [J].
Iswari, Ni Made Satvika .
PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2016,