An efficient algorithm for DPA-resistent RSA

被引:0
作者
Wang, Yi [1 ]
Leiwo, Jussipekka [1 ]
Srikanthan, Thambipillai [1 ]
Luo Jianwen [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Ctr High Performance Embedded Syst, Singapore 639798, Singapore
来源
2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS | 2006年
关键词
SPA; DPA; RSA; ECC; power analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel attacks are a powerful method to recover sensitive data of smart cards or physical devices from timing, power and fault analysis etc. Currently, simple power analysis (SPA) and differential power analysis (DPA) are popular methods to attack hardware implementation of cryptographic algorithms based on hardware. RSA cryptosystem, use private key as exponent which is easily attacked by means of power analysis. Our paper shows that the attackers still can obtain some sensitive information even by using Kim's countermeasure due to the initial value. Furthermore, we propose a modified countermeasure for DPA-resistant RSA implementation and simulate the power analysis to illustrate our proposed algorithm.
引用
收藏
页码:1659 / +
页数:2
相关论文
共 50 条
[41]   Implementation of RSA Algorithm Using SOPC Technology [J].
Cai Ken ;
Liang Xiaoying .
2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, :121-124
[42]   Proposed hybrid RSA algorithm for cloud computing [J].
Rohini ;
Sharma, Er Tejinder .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, :60-64
[43]   A Short and Efficient Redactable Signature Based on RSA [J].
Lim, Seongan ;
Lee, Hyang-Sook .
ETRI JOURNAL, 2011, 33 (04) :621-628
[44]   The Application of Blind Signature Based on RSA Algorithm [J].
Duo, Chunhong ;
Yue, Yan ;
Yuan, Chengpeng .
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 :2290-+
[45]   Analysis of RSA over Gaussian integers algorithm [J].
Koval, Aleksey ;
Verkhovsky, Boris S. .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, :101-105
[46]   Research and Implementation of RSA Algorithm in Java']Java [J].
Peng, Jiezhao ;
Wu, Qi .
INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2008, :359-363
[47]   NEW KEY GENERATION ALGORITHM FOR RSA CRYPTOSYSTEM [J].
SAKAI, R ;
MORII, M ;
KASAHARA, M .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) :89-97
[48]   Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm [J].
Yadav, Ashok Kumar .
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, :256-262
[49]   An Efficient Proactive RSA Scheme for Ad Hoc Networks [J].
张瑞山 ;
陈克非 .
JournalofDonghuaUniversity, 2007, (01) :46-51
[50]   An Efficient ARIA-RSA-SHA256 Hybridized Encryption Algorithm for Metering Data in Smart Grid Network Systems [J].
Philips, Anita ;
Jayakumar, J. .
INTERNATIONAL JOURNAL OF RENEWABLE ENERGY RESEARCH, 2023, 13 (04) :1467-1480