Title :
Differential Power Analysis resistant hardware implementation of the RSA cryptosystem
Author :
Bayam, Keklik Alptekin ; Ors, Berna
Author_Institution :
Fac. of Electr. & Electron. Eng., Istanbul Tech. Univ., Istanbul
Abstract :
In this paper, RSA cryptosystem was implemented on an FPGA as resistant against differential power analysis attacks. There are hardware and algorithmic countermeasures against power analysis attacks. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery modular multiplication. The Montgomery modular multiplier has been realized with carry save adders. Carry save representation has been used throughout the RSA encryption algorithm. The protected implementation resulted in 66,66 MHz of clock frequency, 84,42 Kb/s of throughput, and 6,06 ms of total exponentiation time and occupied an area of 10986 slices with the use of the built-in block SelectRAM structure inside XCV1000E.
Keywords :
field programmable gate arrays; multiplying circuits; public key cryptography; FPGA; Montgomery modular multiplication; Montgomery modular multiplier; RSA cryptosystem; algorithmic countermeasure; differential power analysis attacks; differential power analysis resistant hardware; Algorithm design and analysis; Data engineering; Electronic countermeasures; Field programmable gate arrays; Hardware; Information retrieval; Power engineering and energy; Protection; Public key cryptography; Resistance; Carry Save Adder; Differential Power Analysis Attack; Montgomery Modular Multiplier; RSA; Randomized Table Window Method; Side-Channel Attacks;
Conference_Titel :
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4244-1683-7
Electronic_ISBN :
978-1-4244-1684-4
DOI :
10.1109/ISCAS.2008.4542167