Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems

In this paper, based on the concept of asynchronous strategy, we propose a new novel method to compute modular exponentiations against simple power analysis (SPA) in DSA-like schemes. Since the probabilities of digits in different detected computations are equivalent, the proposed methods are resistant to simple power analysis. Based on the SU1 method of asynchronous strategy, an efficient SPA-resistant method is proposed and has expected time complexity nS + 0.667nM (???1.467nM), where n, S, and M are the number of digits, squaring and multiplication, respectively. Although the performance can be further improved by using signed-digit representations, the security is reduced because of the non-equivalent probabilities of digits.

[1]  Daniel M. Gordon,et al.  A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.

[2]  C. Laih,et al.  Efficient Squaring of Large Integers , 2004 .

[3]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[4]  José M. Matías,et al.  Medium wave DRM field test results in urban and rural environments , 2005, IEEE Transactions on Broadcasting.

[5]  Marc Joye,et al.  Side-Channel Analysis , 2005, Encyclopedia of Cryptography and Security.

[6]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[7]  Marc Joye,et al.  Optimal Left-to-Right Binary Signed-Digit Recoding , 2000, IEEE Trans. Computers.

[8]  Marc Joye,et al.  (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography , 2003, ICICS.

[9]  Xiaoyu Ruan,et al.  Left-to-right optimal signed-binary representation of a pair of integers , 2005, IEEE Transactions on Computers.

[10]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[11]  Ferrell S. Wheeler,et al.  Signed Digit Representations of Minimal Hamming Weight , 1993, IEEE Trans. Computers.

[12]  Chi-Yang Chang,et al.  A new class of wideband multisection 180/spl deg/ hybrid rings using vertically installed planar couplers , 2006, IEEE Transactions on Microwave Theory and Techniques.

[13]  Wu-chuan Yang,et al.  Fast Multicomputation with Asynchronous Strategy , 2007, IEEE Transactions on Computers.

[14]  Sang-Won Yun,et al.  A design of wideband 3-dB coupler with N-section microstrip tandem structure , 2005 .

[15]  Darko Kajfez,et al.  Simplified Design of Lange Coupler , 1978 .

[16]  Chi-Yang Chang,et al.  Modified Vertically Installed Planar Couplers for Ultrabroadband Multisection Quadrature Hybrid , 2006, IEEE Microwave and Wireless Components Letters.

[17]  Kim-Fung Man,et al.  Design of Broadband Hybrid Coupler With Tight Coupling Using Jumping Gene Evolutionary Algorithm , 2009, IEEE Transactions on Industrial Electronics.

[18]  Ikuo Awai,et al.  A directional coupler of a vertically installed planar circuit structure , 1988 .

[19]  Christophe Giraud,et al.  An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis , 2006, IEEE Transactions on Computers.

[20]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[21]  S. Kumar,et al.  A multisection broadband impedance transforming branch-line hybrid , 1995 .

[22]  Frank Hofmann,et al.  Digital Radio Mondiale (DRM) digital sound broadcasting in the AM bands , 2003, IEEE Trans. Broadcast..

[23]  Marc Joye,et al.  Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity , 2004, IEEE Transactions on Computers.

[24]  M.E. Bialkowski,et al.  Design of Compact Directional Couplers for UWB Applications , 2007, IEEE Transactions on Microwave Theory and Techniques.

[25]  Marc Joye,et al.  Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.

[26]  I. Awai,et al.  Applications of the finite difference techniques to the compensated VIP 3 dB directional coupler , 1996 .

[27]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.