ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Cited 7 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Yongje Choi, Dooho Choi, Hoonjae Lee, Jaecheol Ha
Issue Date
2016-02
Citation
Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363
ISSN
1079-8587
Publisher
AutoSoft Press
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1080/10798587.2015.1118909
Abstract
Many cryptographic algorithms embedded in security devices have been used to strengthen home- land defense capability and protect critical information from cyber attacks. The RSA cryptosystem with the naive implementation of an exponentiation may reveal a secret key by two types of side-channel attacks, namely passive leakage information analysis and active fault injection attacks. Recently, a square-always exponentiation algorithm in which the multiplication is traded for squarings has been proposed. This novel algorithm for RSA implementation is faster than other regularity-based countermeasures and is resistant to SPA (simple power analysis) and fault injection attacks. This paper shows that the right-to-left version of square-always exponentiation algorithm is vulnerable to several side-channel attacks, namely collision distance-based doubling, chosen-message CPA (collision power analysis), and horizontal CPA-based combined attacks. Furthermore, an improved right-to-left square-always algorithm adopting the additive message blinding method and the intermediate message update technique is proposed to defeat previous and proposed side-channel attacks. The proposed exponentiation algorithm can be employed for secure CRT-RSA (RSA based on the Chinese remainder theorem) implementation resistant to the Bellcore attack. The paper presents some experimental results for the proposed power analysis attacks using an evaluation board.
KSP Keywords
CRT-RSA, Chinese remainder theorem(CRT), Critical information, Cryptographic Algorithms, Cyber attacks, Defense Capability, Distance-based, Novel algorithm, RSA Cryptosystem, Security devices, Side Channel Attacks