Skip to main content

A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2380 Accesses

Abstract

Aiming at the implement of RSA algorithm, the attack methods are variety. In order to ensure the algorithm can against the side channel attack, in this paper, we present a masking scheme for RSA decryption. Our scheme exploits the multiply-homomorphic property of the existing RSA encryption scheme to compute an multiply-mask as an encryption of a random message and randomly splits the secret key into two shares as the sub-calculate such that each share is statistically independent from the original value. Our solution differs in several aspects from the recent masking RSA implementation. According to encrypted random number, the original ciphertext is blinded and the splitting secret key can reduce the size of the key and speed up the calculation of the algorithm. During the decryption, all the operations are under the masking state, therefore, through multiply masking and secret key splitting, we can secure a RSA implementation, the scheme we proposed can against the timing attack, simple power attack and differential power attack. Compared with others, this scheme can reach a higher calculation and security level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  2. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  3. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  4. Han, L., Wang, X., Xu, G.: On an attack on RSA with small CRT-exponents. Sci. China: Inf. Sci. 41(2), 173–180 (2011)

    Google Scholar 

  5. Zou, H., Yu, M., Wang, J.: An prime generating scheme to avoid effectively common modulus attack on RSA. Comput. Eng. Appl. 27, 88–89+153 (2004)

    Google Scholar 

  6. Jiang, Z., Huai, J., Wang, Y.: Investigation and analysis of the weakness and efficiency of genaralized cycling attacks on RSA modulus. J. Commun. 30(6), 70–74 (2009)

    Google Scholar 

  7. Finke, T., Gebhardt, M., Schindler, W.: A new side-channel attack on RSA prime generation. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 141–155. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04138-9_11

    Chapter  Google Scholar 

  8. Vuillaume, C., Endo, T., Wooderson, P.: RSA key generation: new attacks. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 105–119. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29912-4_9

    Chapter  Google Scholar 

  9. Yen, S.M., Lien, W.C., Moon, S., Ha, J.: Power analysis by exploiting chosen message and internal collisions – vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183–195. Springer, Heidelberg (2005). https://doi.org/10.1007/11554868_13

    Chapter  Google Scholar 

  10. Miyamoto, A., Homma, N., Aoki, T., et al.: Enhanced power analysis attack using chosen message against RSA hardware implementations. In: IEEE International Symposium on Circuits and Systems, pp. 3282–3285. IEEE (2008)

    Google Scholar 

  11. Zhang, B., Yin, X.: Secure and efficient implementation for RSA cryptographic algorithm. Acta Scientiarum Naturalium Universitatis Sunyatseni 47(6), 22–26 (2008)

    MathSciNet  Google Scholar 

  12. Fouque, P.A., Guillermin, N., Leresteux, D., et al.: Attacking RSA–CRT signatures with faults on montgomery multiplication. J. Cryptogr. Eng. 3(1), 447–462 (2013)

    Article  Google Scholar 

  13. Chen, Y., Wu, Z., Chen, J., et al.: Implementation of equivalent power consumption coding secure against side channel attack. J. Univ. Electron. Sci. Technol. China 37(2), 168–171 (2008)

    Google Scholar 

  14. Zhao, Y., Zhao, J., Han, M.: An improved window algorithm for RSA against side channel attack. Comput. Eng. 39(6), 150–154 (2013)

    Google Scholar 

  15. Han, J., Zeng, X., Tang, T.: Power trace analysis attack and countermeasures for RSA cryptographic circuits. Chin. J. Comput. 29(4), 4590–4596 (2006)

    Google Scholar 

  16. Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967–970 (2000)

    Article  Google Scholar 

  17. Ren, Y., Wu, L., Li, X., et al.: Design and implementation of a side-channel resistant and low power RSA processor. J. Tsinghua Univ. (Sci. Technol.) 56(1), 1–6 (2016)

    Google Scholar 

  18. Zhang, B., Zhong, W.: Improvement of RSA algorithm to resist side-channel attacks in PTM. Mod. Electron. Tech. 39(19), 67–70+75 (2016)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of China (No. 61370188); The Scientific Research Common Program of Beijing Municipal Commission of Education (Nos. KM201610015002, KM201510015009); “13th Five-Year” National Cryptography Development Foundation (No. 20170110); The Beijing City Board of Education Science and technology key project (Nos. KZ201510015015, KZ201710015010); Project of Beijing Municipal College Improvement Plan (No. PXM2017_014223_000063); 2018 Academic innovation team of digital copyright protection (No. 041901180021093); BIGC Project (Nos. Ec201803, Ed201802, Ea201806).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zichen Li or Yafei Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Li, Z., Sun, Y., Liu, B., Yang, Y. (2018). A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy