Design and verification of improved CMERE against power analysis attacks

Q2 Engineering
H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan
{"title":"Design and verification of improved CMERE against power analysis attacks","authors":"H. J. Mahanta, Abhilash Chakraborty, Ajoy Kumar Khan","doi":"10.1080/23335777.2020.1769735","DOIUrl":null,"url":null,"abstract":"ABSTRACT The CMERE algorithm was designed to resist DPA attacks on modular exponentiation. It was implemented and tested at the algorithmic level for different key sizes of the RSA cryptosystems. The strength of CMERE lied on the facts that it could be implemented both on left-to-right and right-to-left binary methods for modular exponentiation without any changes in the original algorithm. Also, the execution of modular exponentiation was completely bit independent making it a very strong countermeasure against simple and differential power analysis attacks. In this paper, we have verified the CMERE algorithm at hardware level using VHDL. During formal verification with VHDL on FPGA, the algorithm was modified for practical implementation. However, the overall strength of the improved CMERE algorithm remains the same as the original algorithm.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"16 1","pages":"165 - 179"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23335777.2020.1769735","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

ABSTRACT The CMERE algorithm was designed to resist DPA attacks on modular exponentiation. It was implemented and tested at the algorithmic level for different key sizes of the RSA cryptosystems. The strength of CMERE lied on the facts that it could be implemented both on left-to-right and right-to-left binary methods for modular exponentiation without any changes in the original algorithm. Also, the execution of modular exponentiation was completely bit independent making it a very strong countermeasure against simple and differential power analysis attacks. In this paper, we have verified the CMERE algorithm at hardware level using VHDL. During formal verification with VHDL on FPGA, the algorithm was modified for practical implementation. However, the overall strength of the improved CMERE algorithm remains the same as the original algorithm.
针对功率分析攻击的改进CMERE的设计和验证
CMERE算法是为了抵抗DPA的模幂攻击而设计的。它在算法级别上对不同密钥大小的RSA密码系统进行了实现和测试。CMERE的强大之处在于,它既可以在从左到右的二进制方法上实现,也可以在从右到左的二进制方法上实现,而无需对原始算法进行任何更改。此外,模幂运算的执行完全独立于位,使其成为对抗简单和差分功率分析攻击的非常强大的对策。在本文中,我们使用VHDL在硬件层面验证了CMERE算法。在FPGA上用VHDL进行形式化验证时,对该算法进行了修改,以便于实际实现。但改进后的CMERE算法的整体强度与原算法保持一致。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Cyber-Physical Systems
Cyber-Physical Systems Engineering-Computational Mechanics
CiteScore
3.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信