2019
DOI: 10.1109/tc.2019.2924630
|View full text |Cite
|
Sign up to set email alerts
|

Resilience of Randomized RNS Arithmetic with Respect to Side-Channel Leaks of Cryptographic Computation

Abstract: In this paper, we want to promote the influence of randomized arithmetic on the leaks during a code execution. When somebody wants to extract some specific information from these leaks, one can observe different emanations of the device like power consumption. These leaks mostly come from the variations of the Hamming distances of the successive states of the system. This phenomenon is particularly critical for cryptographic devices. Our work evaluates the resilience of randomized moduli in Residue Number Syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Their work only considered primes as it was easy to count them for security purposes, and did not have a way to randomly generate pairwise coprime sets and let alone count them: opening the path to pairwise coprime sets, which includes sets of prime numbers, would allow them to keep a similar level of security with smaller sets or smaller moduli as the number of possible combinations increases. The approach of using large combination sets to enhance the security is not new: it has been used to increase the amount of possible number representations possible to thwart side-channels attacks [4,10,35].…”
Section: Required Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Their work only considered primes as it was easy to count them for security purposes, and did not have a way to randomly generate pairwise coprime sets and let alone count them: opening the path to pairwise coprime sets, which includes sets of prime numbers, would allow them to keep a similar level of security with smaller sets or smaller moduli as the number of possible combinations increases. The approach of using large combination sets to enhance the security is not new: it has been used to increase the amount of possible number representations possible to thwart side-channels attacks [4,10,35].…”
Section: Required Propertiesmentioning
confidence: 99%
“…As we do not require modular inverses or base extensions, we could also use redundant arithmetic or random draws of moduli without resorting on coprimality. Like in [4,10,35], a high number of possible combinations is at the core of the security, and our generator provide it. The issue is the lack of guaranteed coprimality and maybe the computation of modular inverses in constant time without branching, but this could be a (very difficult) further research direction.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…RNS are also particularly interesting for countering attacks by faults, as the addition of redundancy elements at the base level makes it possible to set up fault detection [27]. Finally, the random drawing of bases ensures that the same calculation produces different patterns at each evaluation, making learning possible leakage of information more difficult [28].…”
Section: Introductionmentioning
confidence: 99%
“…These two representations support the paralellization of the computation since operations over each moduli or coefficients are independent. Furthermore, both arithmetics have sidechannel attack resistance properties [9], [16], [17].…”
Section: Introductionmentioning
confidence: 99%