On the BRIP algorithms security for RSA

被引:0
|
作者
Amiel, Frederic [1 ]
Feix, Benoit [2 ]
机构
[1] Texas Instruments Inc, F-13794 Villeneuve Loubet, France
[2] INSIDE CONTACTLESS, F-13856 Aix En Provence 3, France
关键词
power analysis; collision attacks; RSA; BRIP; modular multiplication and exponentiation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power Analysis has been intensively studied since the first publications in 1996 and many related attacks on naive implementations have been proposed. Nowadays algorithms in tamper resistant devices are protected by different countermeasures most often based on data randomization such as the BRIP algorithm on ECC and its RSA derivative. However not all of them are really secure or in the best case proven to be secure. In 2005, Yen, Lien, Moon and Ha introduced theoretical power attacks on some classical and BRIP exponentiation implementations, characterized by the use of a chosen input message value +/- 1. The first part of our article presents an optimized implementation for BRIP that takes advantage of the Montgomery modular arithmetic to speed up the mask inversion operation. An extension of the Yen et al. attack, based on collision detection through power analysis, is also presented. Based on this analysis we give security advice on this countermeasure implementation and determine the minimal random length to reach an appropriate level of security.
引用
收藏
页码:136 / +
页数:4
相关论文
共 50 条
  • [1] Analysis of Encryption Algorithms (RSA, SRNN and 2 key pair) for Information Security
    Bonde, Sarika Y.
    Bhadade, U. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [2] On the security of RSA screening
    Coron, JS
    Naccache, D
    [J]. PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 197 - 203
  • [3] On the security of RSA encryption in TLS
    Jonsson, J
    Kaliski, BS
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 127 - 142
  • [4] Security dynamics buys RSA
    Davis, S
    [J]. INTERNET WORLD, 1996, 7 (07): : 18 - 18
  • [5] An Algorithm to Enhance Security in RSA
    Minni, Rohit
    Sultania, Kaushal
    Mishra, Saurabh
    Vincent, Durai Raj
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [6] Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter
    Siregar, H.
    Junaeti, E.
    Hayatno, T.
    [J]. 1ST ANNUAL APPLIED SCIENCE AND ENGINEERING CONFERENCE (AASEC), IN CONJUCTION WITH THE INTERNATIONAL CONFERENCE ON SPORT SCIENCE, HEALTH, AND PHYSICAL EDUCATION (ICSSHPE), 2017, 180
  • [7] ALGORITHMS FOR SOFTWARE IMPLEMENTATIONS OF RSA
    SELBY, A
    MITCHELL, C
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1989, 136 (03): : 166 - 170
  • [8] The security of individual RSA bits
    Håstad, J
    Näslund, M
    [J]. 39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 510 - 519
  • [9] Security and performance evaluation of ESIGN and RSA on IC cards by using byte-unit modular algorithms
    Yang, CH
    Morita, H
    Okamoto, T
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1244 - 1248
  • [10] Strengthening Security of RSA-OAEP
    Boldyreva, Alexandra
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 399 - 413