ABSTRACT
In this paper, an efficient immunity method is proposed for two-prime RSA cryptosystem against hardware fault attack. The proposed system has more immunity than the previous system and is targeted for FPGA implementation. For the 32-bit signing case, the proposed method is 15% faster than the previous design while requiring only 70% of the hardware resource.
- R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120--126, Feb. 1978. Google ScholarDigital Library
- J. Grossschadl, "The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip," Computer Security Applications, 16th Annual Conference, New Orleans, USA, Dec. 2000, pp. 384--393. Google ScholarDigital Library
- RSA Laboratories, "PKCS #1 v2.0 Amendment 1: Multi-Prime RSA," July 2000. Available: ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-0a1.pdfGoogle Scholar
- Krishnamurthy, Y. Tang, C. Xu and Y. Wang, "An Efficient Implementation of Multi-Prime RSA on Dsp Processor," IEEE Int. Con. on Acoustics, Speech, & Signal Processing, vol. 2, pp 413--416, April 2003. Google ScholarDigital Library
- C.-H. Wu, J.-H. Hong and C. W. Wu, "RSA cryptosystem design based on the Chinese Remainder Theorem," Proceedings of the ASP-DAC 2001, Las Vegas, USA, Jan-Feb. 2001, pp. 391--395. Google ScholarDigital Library
- A. Shamir, "How to Check Modular Exponentiation," EUROCRYPT '97, May 1997.Google Scholar
- S. Yen, S. Kim, S. Lim and S. Moon, "RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis," IEEE Transactions on computers, vol. 52, pp 461--472, April 2003. Google ScholarDigital Library
Index Terms
- Two-prime RSA immune cryptosystem and its FPGA implementation
Recommendations
Efficient hardware implementation of RSA cryptography
ASID'09: Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communicationThis paper presents the design and implementation of a RSA crypto accelerator. The purpose is to present an efficient hardware implementation technique of RSA cryptosystem using standard algorithms and HDL based hardware design methodology. The paper ...
Revisiting Prime Power RSA
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus is of the form N = p r q for r 2 . This variant is known as Prime Power RSA. The work of Sarkar improves the result of May (PKC 2004) when r 5 . In this ...
Efficient key management FPGA-based cryptosystem using the RNS and iterative coding
The paper reports the development of a new cryptosystem with a multilevel structure for encryption and decryption. At the first level, RNS-based implementation of a public-key RSA signature converts the original plaintext into a ciphertext. Iterated ...
Comments