METHOD FOR PROTECTION MODULAR EXPONENTIATION OPERANDS RECONSTRATION BY POWER ANALYSIS

Authors

  • Kuts Volodymyr Yuriiovych National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Harasymovych Halyna Volodymyrivna National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

Abstract

The goal of presented by article research is to point out the potential vulnerabilities of modular exponentiation operands reconstruction by power dynamic analysis and to elaborate countermeasures. It has been shown that exponent of modular exponentiation which is secret key of RSA, El-Gamal and DSA can be reconstruction by timing power analysis. For countermeasure the special algorithm for modular exponentiation has been worked out. Proposed algorithm does not conditional operators use and include the false operators which inhibit to timing power analysis. It has been shown that implementation of proposed approach demand about 25% more time for modular exponentiation. 

Key words: power analysis, smart cards, cryptographic algorithms,  data security protocols, terminal computer devises.

Bibl.: 6

Published

2023-11-08

Issue

Section

IoT, Real Time Systems