TAILIEUCHUNG - A Protected Division Algorithm

This paper proposes an efficient division algorithm protected against simple side-channel analysis. The proposed algorithm applies equally well to software and hardware implementations. Furthermore, it does not impact the running time nor the memory requirements. | A Protected Division Algorithm Published in P. Honeyman Ed. Fifth Smart Card Research and Advanced Application Conference CARDIS 02 pp. 69-74 Usenix Association 2002. Marc Joye and Karine Villegas Gemplus Card International Card Security Group La Vigie Avenue des Jujubiers ZI Athelia IV 13705 La Ciotat Cedex France @ http MarcJoye http smart Abstract. Side-channel analysis is a powerful tool for retrieving secrets embedded in cryptographic devices such as smart cards. Although several practical solutions have been proposed to prevent the leakage of sensitive data mainly the protection of the basic cryptographic operation itself has been thoroughly investigated. For example for exponentiation-based cryptosystems including RSA DH or DSA various exponentiation algorithms protected against side-channel analysis are known. However the exponentiation algorithm itself or the underlying crypto-algorithm often involve division operations for computing a quotient or a remainder . The first case appears in the normalization resp. denormalization process in fast exponentiation algorithms and the second case appears in the data processing before resp. after the call to the exponentiation operation. This paper proposes an efficient division algorithm protected against simple side-channel analysis. The proposed algorithm applies equally well to software and hardware implementations. Furthermore it does not impact the running time nor the memory requirements. Keywords. Division algorithms smart cards side-channel analysis SPA protected implementations. 1 Introduction Significant progress has been made these last years to secure cryptographic devices . smart cards against side-channel analysis. Side-channel analysis 2 3 is a clever technique exploiting side-channel information . power consumption to retrieve secret information involved in the execution of a carelessly implemented crypto-algorithm. The .

TÀI LIỆU MỚI ĐĂNG
10    171    3    22-11-2024
8    148    1    22-11-2024
165    131    2    22-11-2024
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.