Message blinding method requiring no multiplicative inversion for RSA

Heeseok Kim, Dong Guk Han, Seokhie Hong, Jaecheol Ha

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n3) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis.

Original languageEnglish
Article number80
JournalTransactions on Embedded Computing Systems
Volume13
Issue number4
DOIs
Publication statusPublished - 2014

Fingerprint

Computational complexity
Side channel attack

Keywords

  • Message blinding method
  • Power analysis
  • Side channel attacks

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Cite this

Message blinding method requiring no multiplicative inversion for RSA. / Kim, Heeseok; Han, Dong Guk; Hong, Seokhie; Ha, Jaecheol.

In: Transactions on Embedded Computing Systems, Vol. 13, No. 4, 80, 2014.

Research output: Contribution to journalArticle

@article{84828ef03ea14e2a9480ff854b0f4cc3,
title = "Message blinding method requiring no multiplicative inversion for RSA",
abstract = "This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n3) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis.",
keywords = "Message blinding method, Power analysis, Side channel attacks",
author = "Heeseok Kim and Han, {Dong Guk} and Seokhie Hong and Jaecheol Ha",
year = "2014",
doi = "10.1145/2560020",
language = "English",
volume = "13",
journal = "Transactions on Embedded Computing Systems",
issn = "1539-9087",
publisher = "Association for Computing Machinery (ACM)",
number = "4",

}

TY - JOUR

T1 - Message blinding method requiring no multiplicative inversion for RSA

AU - Kim, Heeseok

AU - Han, Dong Guk

AU - Hong, Seokhie

AU - Ha, Jaecheol

PY - 2014

Y1 - 2014

N2 - This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n3) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis.

AB - This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation is O(n3) which is equal to that of the exponentiation. Thus, this additional operation is known to be the main drawback of the existing message blinding methods for RSA. In addition to requiring no additional multiplicative inversion, our new countermeasure provides the security against various power analysis attacks as well as general differential power analysis.

KW - Message blinding method

KW - Power analysis

KW - Side channel attacks

UR - http://www.scopus.com/inward/record.url?scp=84930345111&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84930345111&partnerID=8YFLogxK

U2 - 10.1145/2560020

DO - 10.1145/2560020

M3 - Article

AN - SCOPUS:84930345111

VL - 13

JO - Transactions on Embedded Computing Systems

JF - Transactions on Embedded Computing Systems

SN - 1539-9087

IS - 4

M1 - 80

ER -