Secure and Efficient Designs for Public Key Cryptosystems

博士 === 國立成功大學 === 電腦與通信工程研究所 === 100 === For portable and resource-constrained devices, we may demand cryptographic primitives to provide functionality like authentication, integrity and secrecy. These cryptographic primitives (e.g., RSA and ECC) require basic operations such as modular exponentiati...

Full description

Bibliographic Details
Main Authors: Chia-YuLu, 盧嘉昱
Other Authors: Jar-Ferr Yang
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/32831355324391260998
id ndltd-TW-100NCKU5652039
record_format oai_dc
spelling ndltd-TW-100NCKU56520392015-10-13T21:38:02Z http://ndltd.ncl.edu.tw/handle/32831355324391260998 Secure and Efficient Designs for Public Key Cryptosystems 安全與有效率之公開金鑰密碼系統設計 Chia-YuLu 盧嘉昱 博士 國立成功大學 電腦與通信工程研究所 100 For portable and resource-constrained devices, we may demand cryptographic primitives to provide functionality like authentication, integrity and secrecy. These cryptographic primitives (e.g., RSA and ECC) require basic operations such as modular exponentiation or point (scalar) multiplication. In practice, if modular exponentiation and point (scalar) multiplication are not protected with specific methods, they may be vulnerable to side-channel analysis (SCA), which typically includes simple power analysis (SPA) and differential power analysis (DPA). Designing a SCA-resistant multiplication algorithm requires balancing speed and security through challenging designs. We found though many SPA-resistant scalar multiplication algorithms have been proposed, most are inefficient and not interoperable with other recoding methods. Based on the concept of asynchronous strategy, we propose an efficient method to compute modular exponentiations against SPA for DSA-like schemes. To provide better multiplication algorithm, we develop a general framework based on the side-channel atomicity techniques to protect nearly all fast recoding methods/number systems. Our framework supplies security and flexibility, and has best average performance among previous works. Moreover, we give solutions to address the effects caused by conditional branches to prevent from the SN-sequence attack and its variants. Our solutions are easily incorporated to achieve more security resilience and incur low overhead in most cases. Using the proposed techniques, a comprehensive countermeasure against numerous SCAs can be accomplished while possessing competitive efficiency. Jar-Ferr Yang 楊家輝 2012 學位論文 ; thesis 82 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立成功大學 === 電腦與通信工程研究所 === 100 === For portable and resource-constrained devices, we may demand cryptographic primitives to provide functionality like authentication, integrity and secrecy. These cryptographic primitives (e.g., RSA and ECC) require basic operations such as modular exponentiation or point (scalar) multiplication. In practice, if modular exponentiation and point (scalar) multiplication are not protected with specific methods, they may be vulnerable to side-channel analysis (SCA), which typically includes simple power analysis (SPA) and differential power analysis (DPA). Designing a SCA-resistant multiplication algorithm requires balancing speed and security through challenging designs. We found though many SPA-resistant scalar multiplication algorithms have been proposed, most are inefficient and not interoperable with other recoding methods. Based on the concept of asynchronous strategy, we propose an efficient method to compute modular exponentiations against SPA for DSA-like schemes. To provide better multiplication algorithm, we develop a general framework based on the side-channel atomicity techniques to protect nearly all fast recoding methods/number systems. Our framework supplies security and flexibility, and has best average performance among previous works. Moreover, we give solutions to address the effects caused by conditional branches to prevent from the SN-sequence attack and its variants. Our solutions are easily incorporated to achieve more security resilience and incur low overhead in most cases. Using the proposed techniques, a comprehensive countermeasure against numerous SCAs can be accomplished while possessing competitive efficiency.
author2 Jar-Ferr Yang
author_facet Jar-Ferr Yang
Chia-YuLu
盧嘉昱
author Chia-YuLu
盧嘉昱
spellingShingle Chia-YuLu
盧嘉昱
Secure and Efficient Designs for Public Key Cryptosystems
author_sort Chia-YuLu
title Secure and Efficient Designs for Public Key Cryptosystems
title_short Secure and Efficient Designs for Public Key Cryptosystems
title_full Secure and Efficient Designs for Public Key Cryptosystems
title_fullStr Secure and Efficient Designs for Public Key Cryptosystems
title_full_unstemmed Secure and Efficient Designs for Public Key Cryptosystems
title_sort secure and efficient designs for public key cryptosystems
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/32831355324391260998
work_keys_str_mv AT chiayulu secureandefficientdesignsforpublickeycryptosystems
AT lújiāyù secureandefficientdesignsforpublickeycryptosystems
AT chiayulu ānquányǔyǒuxiàolǜzhīgōngkāijīnyàomìmǎxìtǒngshèjì
AT lújiāyù ānquányǔyǒuxiàolǜzhīgōngkāijīnyàomìmǎxìtǒngshèjì
_version_ 1718067177788014592