Masterarbeit, 2019
60 Seiten, Note: A
The primary objective of this work is to introduce and analyze an improved modular exponentiation approach designed to effectively resist various power analysis attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), in asymmetric cryptosystems like RSA and CRT-RSA.
1.2 Side-Channel Attacks
Side-channel analysis refers to analysis of those properties which are independent of the cryptographic algorithms but of cryptographic devices. These analyses are made on power consumption, computation time, electro-magnetic effects etc. that leaks from a device. When these analyses are done to challenge the strength of a cryptographic algorithm in a device, they are termed as Side-Channel Attack (SCA). SCA depend on information collected from the physical system being used to encrpyt or decrypt. Successful side-channel attacks use the encrpytion process nor the plaintext to the encrypted but rather may be related to the amount of time it takes for a system to respond to queries, the amount of power consumed by encrypting system. It is a form of reverse engineering. Electronic circuits are inherently leaky-they produce emissions as byproducts that make it possible for an attacker without access to the circuitry itself to deduce how the circuit works and what data it is processing. Some widely used side channel attacks are power analysis attacks, timing attacks, EM attacks, fault attacks etc. In asymmetric cryptosystem two different keys are generated to encrypt and decrypt the data. One kind of asymmetric cryptographic algorithm is Rivest-Shamir-Adleman (RSA) developed in 1977. RSA consists three phases they are:-
For performing encryption and decryption, two different keys are used. The key that is used for encryption and which is known to everyone is called "public-key". The key that is known by receiver only and remains secret is called "private-key". As RSA
1.2.1 Timing Attacks
In a computer system, every logical operations performs take time and that time depends on the input provides in a sysytem. Timing attack is the attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute the cryptographic algorithms. Due to optimization, the cryptographic algotithm performs computation during execution in non-constant time. Involvement of such computation provides a secret parameters, that leads to variation in time, such variations of time can leak some data and give enough informstiom of the usage which as a type of statiscal analysis it could even prompt the entire retrieval of secret parameters.Timing attack is a technique to exploit the time variance of cryptographic operations. Attacker uses timing attack to obtain user's personal data by attentively measuring the time take by the user's to perform cryptographic operations [36]. Figure 1.3 gives a conceptual view of timing attack.
ABSTRACT: This section summarizes the problem of modular exponentiation vulnerability to side-channel attacks and introduces a proposed randomized "Multiply-Always" binary method with dummy multiplications to resist these attacks, analyzed for RSA and CRT-RSA.
1 INTRODUCTION: This chapter discusses the growing threat of cyber attackers and hackers in data security, emphasizing the need for robust information security measures, especially cryptography, against various attack types.
2 POWER ANALYSIS ATTACKS AND COUNTERMEASURES: This chapter details different types of power analysis attacks, including Simple Power Analysis (SPA) and Differential Power Analysis (DPA), and explores various software and hardware-based countermeasures designed to mitigate these vulnerabilities.
3 LITERATURE SURVEY: This chapter reviews the RSA cryptosystem, methods for implementing modular exponentiation, existing DPA attacks on these implementations, and previous techniques for resisting such attacks.
4 PROPOSED WORK: This chapter presents a new approach for secured modular exponentiation by incorporating randomization and dummy operations within the "multiply-always" and "Montgomery-ladder" binary methods to resist power analysis attacks, also extended to CRT-RSA.
5 RESULT AND ANALYSIS: This chapter describes the experimental environment, PKCS test benches, and presents computational analysis results for the proposed algorithms against existing countermeasures in RSA and CRT-RSA, demonstrating their effectiveness.
6 CONCLUSION AND FUTURE WORK: This chapter summarizes the proposed modular exponentiation approach as an effective countermeasure against power analysis attacks and outlines future work involving the merging of blinding and randomization techniques for enhanced security.
Modular Exponentiation, Power Analysis Attacks, Side-Channel Attacks, RSA, CRT-RSA, Cryptography, Randomization, Dummy Operations, Smart Cards, Security, Countermeasures, Timing Attacks, Differential Power Analysis, Information Security.
This work is fundamentally about improving the security of modular exponentiation, a core operation in asymmetric cryptosystems like RSA, by making it more resistant to power analysis attacks.
The central thematic areas include cryptography, side-channel attacks (specifically power analysis attacks), modular exponentiation, RSA and CRT-RSA cryptosystems, and the design of cryptographic countermeasures through randomization and dummy operations.
The primary objective is to introduce a new approach to compute modular exponentiation that can effectively resist various power analysis attacks, by designing algorithms based on randomized dummy operations.
The scientific method employed involves the design and implementation of new algorithms (Proposed Algorithms 6 & 7), followed by an experimental analysis of their performance and security against existing attacks, using test benches like PKCS v2.1.10 and comparing results with other methods.
The main part of the work covers an introduction to cryptographic attacks, a literature review of modular exponentiation and DPA attacks, the detailed explanation of the proposed randomized algorithms, their implementation in CRT-RSA, and a comprehensive security and complexity analysis with experimental results.
The work is characterized by keywords such as Modular Exponentiation, Power Analysis Attacks, Side-Channel Attacks, RSA, CRT-RSA, Cryptography, Randomization, Dummy Operations, Smart Cards, Security, Countermeasures, Timing Attacks, Differential Power Analysis, and Information Security.
The proposed approach resists power analysis attacks by injecting dummy multiplication operations into the squaring and multiplication processes, and by randomly choosing between two designed processes, which makes it difficult to distinguish actual operations from power traces.
This work specifically targets the RSA (Rivest-Shamir-Adleman) cryptosystem and its variant, CRT-RSA (Chinese Remainder Theorem-RSA), which are widely used asymmetric cryptographic algorithms.
The proposed algorithms are designed based on improvements to two popular binary methods for modular exponentiation: the "Multiply-Always" method and the "Montgomery-Ladder" algorithm.
The proposed algorithms are shown to resist Simple Power Analysis (SPA), single trace attacks, doubling attacks, and other specific attacks mentioned in the literature, by obscuring data-dependent power consumption patterns.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

