Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (1) : 1-6     DOI: 10.16511/j.cnki.qhdxxb.2016.23.012
INFORMATION SECURITY |
Design and implementation of a side-channel resistant and low power RSA processor
REN Yanting1,2, WU Liji1,2, LI Xiangyu1,2, WANG An1,2, ZHANG Xiangmin1,2
1. Institute of Microelectronics, Tsinghua University, Beijing 100084, China;
2. Tsinghua National Laboratory for Information Science and Technology, Beijing 100084, China
Download: PDF(1106 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  RSA is the most widely used public-key algorithm, and is specified as the signature algorithm in bank IC cards. The unprotected RSA implementation is vulnerable to side-channel attacks as pointed out in several works. Due to the complexity of the algorithm, the power consumption of an RSA module is usually high. A side-channel resistant, efficient and low-power RSA processor was designed using countermeasures against side-channel attacks based on the Montgomery ladder with a modified Montgomery algorithm then proposed, which combines CIOS and Karatsuba algorithms. The computation time of modular multiplication can be reduced by 25% with the length of RSA being configurable and up to 2 048 bits. The proposed RSA module was verified with C*Core C0 in FPGA board. With SMIC 0.13 μm CMOS process, the EDA synthesis result indicates that the area is about 24 000 gates, and the throughput of 1024-bit RSA is 8.3 kb/s under the frequency of 30 MHz with the power consumption of 1.15 mW.
Keywords RSA      low-power      side-channel attack      Montgomery algorithm     
ZTFLH:  TN4  
Issue Date: 15 January 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
REN Yanting
WU Liji
LI Xiangyu
WANG An
ZHANG Xiangmin
Cite this article:   
REN Yanting,WU Liji,LI Xiangyu, et al. Design and implementation of a side-channel resistant and low power RSA processor[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 1-6.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.23.012     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I1/1
  
  
  
  
  
  
  
[1] Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Cmmunications of the ACM, 1978, 21(2): 120-126.
[2] Kocher P, Jaffe J, Jun B. Differential power analysis [C]//Advances in Cryptology—CRYPTO'99. Springer Berlin Heidelberg, 1999: 388-397.
[3] Marc J, Michael T. Fault Analysis in Cryptography [M]. Springer Berlin Heidelberg, 2012.
[4] Marc J, YEN Sungming. The Montgomery powering ladder [C]//Proc CHES. Springer, 2003: 291-302.
[5] Giraud C. An RSA implementation resistant to fault attacks and to simple power analysis [J]. Computers, IEEE Transactions on, 2006, 55(9): 1116-1120.
[6] Montgomery P L. Modular multiplication without trial division [J]. Mathematics of Computation, 1985, 44(1): 519-521.
[7] Koç C K, Acar T, Kaliski B S. Analyzing and comparing Montgomery multiplication algorithms [J]. IEEE Micro, 16(3), 1996: 26-33.
[8] 孔凡玉, 于佳, 李大兴. 一种改进的Montgomery模乘快速算法[J]. 计算机工程, 2005, 31(8): 1-3.KONG Fanyu, YU Jia, LI Daxing. An improved fast Montgomery multiplication algorithm [J]. Computer Engineering, 2005, 31(8): 1-3. (in Chinese)
[9] Karatsuba A, Ofman Y. Multiplication of many-digital numbers by automatic computers [J]. Proceedings of the USSR Academy of Science, 1962, 145: 293-294.
[10] WANG Deming, DING Yanyu, ZHANG Jun, et al. Area-efficient and ultra-low-power architecture of RSA processor for RFID [J]. Electronic Letters, 2012, 48(19): 1185-1187.
[11] HUANG Wei, YOU Kaidi, ZHANG Suiyu, et al. Unified low cost crypto architecture accelerating RSA/SHA-1 for security processor [C]//ASICON'09. 2009: 151-154.
[1] FU Hanliang, TAN Yubing, XIA Zhongjing, GUO Xiaotong. Effect of expert hazard identification trajectory on construction workers' safety education: Evidence from an eye-tracking experiment[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(2): 205-213.
[2] XING Yujie, WANG Xiao, SHI Chuan, HUANG Hai, CUI Peng. Robust verification of graph contrastive learning based on node feature adversarial attacks[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(1): 13-24.
[3] LIU Yuanxin, LIAO Wenjie, LIN Yuanqing, XIE Linlin, LU Xinzheng. Influence of data features on the generative adversarial network-based intelligent design for shear wall structures[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(12): 2005-2018.
[4] LU Bo, DUAN Xiaodong, YUAN Ye. Self-supervised deep semantics-preserving Hashing for cross-modal retrieval[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1442-1449.
[5] LU Sicong, LI Chunwen. Human-machine conversation system for chatting based on scene and topic[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 952-958.
[6] LENG Zhiying, SUN Yuewen, TONG Jianmin, WANG Zhentao. Vehicle radiation image restoration based on a generative adversarial network[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(10): 1691-1696.
[7] TANG Zhili, WANG Xue, XU Qianjun. Rockburst prediction based on oversampling and objective weighting method[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(6): 543-555.
[8] JI Yu, ZHANG Youhui, ZHENG Weimin. Approximate computing method based on memristors[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(6): 610-617.
[9] YANG Hongyu, WANG Fengyan, L�Weili. Network security threat assessment method based on unsupervised generation reasoning[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(6): 474-484.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd