Modular exponentation method with protection against power analysis
DOI:
https://doi.org/10.18372/2073-4751.80.19774Keywords:
power analysis attacks, simple power analysis, differential power analysis, modular exponentiationAbstract
The article proposes a method of modular exponentiation on terminal microcontrollers, which provides protection against recovery of secret operands by power analysis. The method is based on the separation in time of processing of the exponent code bits and correspondent modular multiplication operations by storing the operands necessary for multiplication in memory. This prevents the comparison of the modular multiplications detected from the power consumption diagram with the values of the secret exponent code bits. A formalized procedure for modular exponentiation is presented, the functionality of which is illustrated by an example. A method for selecting the procedure parameters is developed in view of microcontroller embedded memory limitations.
It has been theoretically and experimentally proved by the proposed method, which provides protection against both simple and differential analysis of the power analysis without affecting the time of calculating the modular exponent.
References
Meneghello F. et al. IoT: Internet of Threats. A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet of Things Journal. 2019. Vol. 6, no. 5. P. 8182–8201. DOI: 11.1109/JIOT.2019.2935189.
Mangard S., Oswald E., Popp T. Power Analysis Attacks. Revealing the Secrets of Smart Cards. Springer, 2007. 338 p.
Standaert F-X. et al. An Overview of Power Analysis Attack Against Field Programmable Gate Arrays. Proceeding of the IEEE. 2006. Vol. 92, no. 2. Р. 383–394. DOI: 10.1109/JPROC 2005.862437.
Lerman L., Bontempi G., Markowitch O. Power analysis attack: An approach based on machine learning. International Journal of Applied Cryptography. 2014. Vol. 3, no. 2. Р. 134–148. DOI: 10.1504/IJACT.2014.062722.
Kocher P., Jaffe J., Jun B. Differential Power Analysis. Lecture Notes in Computer Science. Vol. 1666. Advances in Cryptology - CRYPTO '99. 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / ed. by M. Wiener. Berlin, 1999. P. 388–397.
Messerges T. S., Dabbish E. A., Sloan R. H. Power Analysis Attacks of Modular Exponentiation in Smartcards. Lecture Notes in Computer Science. Vol. 1717. Cryptographic Hardware and Embedded Systems. First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings / ed. by C. K. Koc, C. Paar. Berlin, 1999. P. 144–157.
Clavier C., Joye M. Universal exponentiation algorithm - A first step to toward provable SPA-resistance. Lecture Notes in Computer Science. Vol. 2162. Cryptographic Hardware and Embedded Systems - CHES 2001 Third International Workshop, Paris, France, May 14-16, 2001 Proceedings / ed. by C. K. Koc, D. Naccache, C. Paar. Berlin, 2001. P. 300–308.
Shanmugham S. R., Paramasivam S. Survey on power analysis attacks and its impact on intelligent sensor networks. IET Wireless Sensor Systems. 2018. Vol. 8, no. 6. P. 295–304.
Prasad N. D., Avirneni, Somani A. K. Countering Power Analysis Attacks Using Realiable and Aggressive Designs. IEEE Transaction on Computers. 2014. Vol. 63, no. 6. P. 1408–1420. DOI: 10.1109/TC.2013.9.
Borges J. et al. A Secure Cloud Computing Method for Rapid Implementation of Cryptographic Data Protection in IoT. 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) : proceedings, Athens, Greece, 13–15 October 2023 / IEEE. 2023. P. 674–677. DOI: 10.1109/DESSERT61349.2023.10416477.
Русанова О. В., Гайдукевич О. В. Метод розподіленого модулярного експоненціювання на термінальних мікроконтролерах ІоТ з захищеним залученням хмарних обчислень. Проблеми інформатизації та управління. 2024. № 2(78). С. 91–103. DOI: 10.18372/2073-4751.78.18966.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.