The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: To resist power analysis attacks in modular exponentiation based cryptosystems like RSA. Methods/Analysis: A power analysis attack uses the instantaneous power consumed by a cryptosystems during its most sophisticated operations like encryption/decryption which uses the secret keys. Masking/blinding has proven its ability to resist such attacks by hiding the actual data during computation. As a result, analysis of the power consumption would reveal only the masked data keeping the actual secret data intact. Findings: Our proposed technique partitions the secret key into multiple parts and then blinds them individually before the cryptographic computations. With these blinded partitions, it would be very difficult for attackers to reveal the actual data as the power consumptions will be for blinded key not the actual key. Due to partitioning of the exponent there will be no uniformity in the power traces increasing resistance against power analysis attacks. Applications: All the cryptosystems have been found vulnerable to power analysis attacks, it resist modular exponentiation based cryptosystems like RSA from such attacks.

Keywords

Cryptosystem, Masking, Modular Exponentiation, Power Analysis Attacks, RSA
User