Differential power analysis resistant hardware implementation of the RSA cryptosystem


BAYAM K. A., Ors B.

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, cilt.18, sa.1, ss.129-140, 2010 (SCI-Expanded) identifier identifier

Özet

In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method This is the first, FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks Modular exponentiation is realized with Montgomery Modular Multiplication The Montgomery modular multiplier has been realized with Carry-Save Adders Carry-Save representation has been used throughout the RSA encryption algorithm The primarily implemented RSA architecture prevents the extraction of the secret key using Simple Power Analysis attacks When comparing the protected implementation with the unprotected, it can be seen that the total lime has increased by 24 2%, while the throughput has decreased by 19 5%