Abstract
Aiming at the implement of RSA algorithm, the attack methods are variety. In order to ensure the algorithm can against the side channel attack, in this paper, we present a masking scheme for RSA decryption. Our scheme exploits the multiply-homomorphic property of the existing RSA encryption scheme to compute an multiply-mask as an encryption of a random message and randomly splits the secret key into two shares as the sub-calculate such that each share is statistically independent from the original value. Our solution differs in several aspects from the recent masking RSA implementation. According to encrypted random number, the original ciphertext is blinded and the splitting secret key can reduce the size of the key and speed up the calculation of the algorithm. During the decryption, all the operations are under the masking state, therefore, through multiply masking and secret key splitting, we can secure a RSA implementation, the scheme we proposed can against the timing attack, simple power attack and differential power attack. Compared with others, this scheme can reach a higher calculation and security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Han, L., Wang, X., Xu, G.: On an attack on RSA with small CRT-exponents. Sci. China: Inf. Sci. 41(2), 173–180 (2011)
Zou, H., Yu, M., Wang, J.: An prime generating scheme to avoid effectively common modulus attack on RSA. Comput. Eng. Appl. 27, 88–89+153 (2004)
Jiang, Z., Huai, J., Wang, Y.: Investigation and analysis of the weakness and efficiency of genaralized cycling attacks on RSA modulus. J. Commun. 30(6), 70–74 (2009)
Finke, T., Gebhardt, M., Schindler, W.: A new side-channel attack on RSA prime generation. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 141–155. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04138-9_11
Vuillaume, C., Endo, T., Wooderson, P.: RSA key generation: new attacks. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 105–119. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29912-4_9
Yen, S.M., Lien, W.C., Moon, S., Ha, J.: Power analysis by exploiting chosen message and internal collisions – vulnerability of checking mechanism for RSA-decryption. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 183–195. Springer, Heidelberg (2005). https://doi.org/10.1007/11554868_13
Miyamoto, A., Homma, N., Aoki, T., et al.: Enhanced power analysis attack using chosen message against RSA hardware implementations. In: IEEE International Symposium on Circuits and Systems, pp. 3282–3285. IEEE (2008)
Zhang, B., Yin, X.: Secure and efficient implementation for RSA cryptographic algorithm. Acta Scientiarum Naturalium Universitatis Sunyatseni 47(6), 22–26 (2008)
Fouque, P.A., Guillermin, N., Leresteux, D., et al.: Attacking RSA–CRT signatures with faults on montgomery multiplication. J. Cryptogr. Eng. 3(1), 447–462 (2013)
Chen, Y., Wu, Z., Chen, J., et al.: Implementation of equivalent power consumption coding secure against side channel attack. J. Univ. Electron. Sci. Technol. China 37(2), 168–171 (2008)
Zhao, Y., Zhao, J., Han, M.: An improved window algorithm for RSA against side channel attack. Comput. Eng. 39(6), 150–154 (2013)
Han, J., Zeng, X., Tang, T.: Power trace analysis attack and countermeasures for RSA cryptographic circuits. Chin. J. Comput. 29(4), 4590–4596 (2006)
Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967–970 (2000)
Ren, Y., Wu, L., Li, X., et al.: Design and implementation of a side-channel resistant and low power RSA processor. J. Tsinghua Univ. (Sci. Technol.) 56(1), 1–6 (2016)
Zhang, B., Zhong, W.: Improvement of RSA algorithm to resist side-channel attacks in PTM. Mod. Electron. Tech. 39(19), 67–70+75 (2016)
Acknowledgment
This work was supported by the National Natural Science Foundation of China (No. 61370188); The Scientific Research Common Program of Beijing Municipal Commission of Education (Nos. KM201610015002, KM201510015009); “13th Five-Year” National Cryptography Development Foundation (No. 20170110); The Beijing City Board of Education Science and technology key project (Nos. KZ201510015015, KZ201710015010); Project of Beijing Municipal College Improvement Plan (No. PXM2017_014223_000063); 2018 Academic innovation team of digital copyright protection (No. 041901180021093); BIGC Project (Nos. Ec201803, Ed201802, Ea201806).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, J., Li, Z., Sun, Y., Liu, B., Yang, Y. (2018). A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)