An efficient algorithm for DPA-resistent RSA

被引:0
作者
Wang, Yi [1 ]
Leiwo, Jussipekka [1 ]
Srikanthan, Thambipillai [1 ]
Luo Jianwen [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Ctr High Performance Embedded Syst, Singapore 639798, Singapore
来源
2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS | 2006年
关键词
SPA; DPA; RSA; ECC; power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel attacks are a powerful method to recover sensitive data of smart cards or physical devices from timing, power and fault analysis etc. Currently, simple power analysis (SPA) and differential power analysis (DPA) are popular methods to attack hardware implementation of cryptographic algorithms based on hardware. RSA cryptosystem, use private key as exponent which is easily attacked by means of power analysis. Our paper shows that the attackers still can obtain some sensitive information even by using Kim's countermeasure due to the initial value. Furthermore, we propose a modified countermeasure for DPA-resistant RSA implementation and simulate the power analysis to illustrate our proposed algorithm.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
  • [21] Generalized MMM-algorithm secure against SPA, DPA, and RPA
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 282 - 296
  • [22] Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security
    Bansal, Malti
    Gupta, Shubham
    Mathur, Siddhant
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 1340 - 1343
  • [23] Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm
    Jaspin, K.
    Selvan, Shirley
    Sahana, S.
    Thanmai, G.
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 791 - 796
  • [24] An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method
    Saxena, Sapna
    Kapoor, Bhanu
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 850 - 854
  • [25] Efficient Hardware Implementation of RSA Cryptography
    Rahman, Mostafizur
    Rokon, Iqbalur Rahman
    Rahman, Miftahur
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 316 - 319
  • [26] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 425 - 439
  • [27] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    JOURNAL OF THE ACM, 2001, 48 (04) : 702 - 722
  • [28] Implementation of the RSA Algorithm on a DataFlow Architecture
    Bezanic, Nikola
    Popovic-Bozovic, Jelena
    Milutinovic, Veljko
    Popovic, Ivan
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2013, 9 (02): : 11 - 16
  • [29] An Improved Exponentiation Algorithm for RSA Cryptosystem
    Sepahvandi, S.
    Hosseinzadeh, M.
    Navi, K.
    Jalali, A.
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 128 - +
  • [30] Key Generation Algorithm Design Combination of RSA and ElGamal Algorithm
    Iswari, Ni Made Satvika
    PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2016,