2018
DOI: 10.3390/cryptography2030023
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Algorithm for Inversion Modulo 2k

Abstract: Modular inversions are widely employed in public key crypto-systems, and it is known that they imply a bottleneck due to the expensive computation. Recently, a new algorithm for inversions modulo p k was proposed, which may speed up the calculation of a modulus dependent quantity used in the Montgomery multiplication. The original algorithm lacks security countermeasures; thus, a straightforward implementation may expose the input. This is an issue if that input is a secret. In the RSA-CRT signature using Mont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…In [11,20], the proposed countermeasure to protect the BEEA from SPA is based on Equation (6). The same technique is also used to protect the modular inversion in the well-known open source library Mbed TLS [21].…”
Section: Countermeasures Against Sca On Beeamentioning
confidence: 99%
See 2 more Smart Citations
“…In [11,20], the proposed countermeasure to protect the BEEA from SPA is based on Equation (6). The same technique is also used to protect the modular inversion in the well-known open source library Mbed TLS [21].…”
Section: Countermeasures Against Sca On Beeamentioning
confidence: 99%
“…In Equation ( 5), the secret is blinded before the GCD execution. On the other hand, notice how the same secret is manipulated in plaintext in Equation (6). This is not relevant when SPA is the only threat being considered, and we emphasize that these countermeasures aim to mitigate such attacks.…”
Section: Countermeasures Against Sca On Beeamentioning
confidence: 99%
See 1 more Smart Citation