Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

An Improved Modular Exponentiation To Resist Power Analysis Attacks

Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks

Master's Thesis , 2019 , 60 Pages , Grade: A

Autor:in: Moushumi Barman (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Details

Modular exponentiation has been the primary operation in most of the asymmetric cryptosystems. However, for large exponents which serves as the keys for encryption and decryption, conventional way to compute modular exponentiation is very time consuming. Hence, different binary methods based on bit wise "squaring-multiplication" operations is more widely used. However, these approaches are vulnerable to side-channel attacks, specially timing and power analysis attacks. Hence, these approaches are improved so that such attacks can be mitigated.
Two processes have been designed based on "Multiply-Always" binary method which injects dummy multiplications so that the original multiplications can remain intact. The two processes are being invoked based on a random variable which generates either 0 or 1. With these randomized modular exponentiation, the proposed approach can resist simple and differential power analysis attacks to a large extent. The proposed approach has been implemented using conventional "squaring-multiplication" and "Montgomery-Ladder" methods. Further, the work has also been extended to CRT-RSA which is widely used for fast computation. The analysishas been done for different key sizes of 1024 bit, 1536 bit and 2048 bit RSA & CRT-RSA.

Details

Title
An Improved Modular Exponentiation To Resist Power Analysis Attacks
Course
Computer Science and Engineering
Grade
A
Author
Moushumi Barman (Author)
Publication Year
2019
Pages
60
Catalog Number
V1609477
ISBN (PDF)
9783389156100
ISBN (Book)
9783389156117
Language
English
Tags
Side Channel attack, cyber attack
Product Safety
GRIN Publishing GmbH
Quote paper
Moushumi Barman (Author), 2019, An Improved Modular Exponentiation To Resist Power Analysis Attacks, Munich, GRIN Verlag, https://www.grin.com/document/1609477
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  60  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint