Differential Power Analysis resistant hardware implementation of the RSA cryptosystem


Bayam K. A., Ors B.

IEEE International Symposium on Circuits and Systems, Washington, Amerika Birleşik Devletleri, 18 - 21 Mayıs 2008, ss.3314-3315 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1109/iscas.2008.4542167
  • Basıldığı Şehir: Washington
  • Basıldığı Ülke: Amerika Birleşik Devletleri
  • Sayfa Sayıları: ss.3314-3315
  • İstanbul Teknik Üniversitesi Adresli: Evet

Özet

In this paper, RSA cryptosystem was implemented on an FPGA as resistant against Differential Power Analysis attacks. There are hardware and algorithmic countermeasures against power analysis attacks. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery Modular Multiplication. The Montgomery modular multiplier has been realized with carry save adders. Carry save representation has been used throughout the RSA encryption algorithm. The protected implementation resulted in 66,66 MHz of clock frequency, 84,42 Kb/s of throughput, and 6,06 ms of total exponentiation time and occupied an area of 10986 slices with the use of the built-in block SelectRAM structure inside XCV1000E.