Cargando…
SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698026/ https://www.ncbi.nlm.nih.gov/pubmed/36363893 http://dx.doi.org/10.3390/mi13111872 |
_version_ | 1784838713238355968 |
---|---|
author | Morales Romero, José de Jesús Reyes Barranca, Mario Alfredo Tinoco Varela, David Flores Nava, Luis Martin Espinosa Garcia, Emilio Rafael |
author_facet | Morales Romero, José de Jesús Reyes Barranca, Mario Alfredo Tinoco Varela, David Flores Nava, Luis Martin Espinosa Garcia, Emilio Rafael |
author_sort | Morales Romero, José de Jesús |
collection | PubMed |
description | Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a modification of a modular exponentiation algorithm implemented in programmable devices, such as the Field Programmable Gate Array, for which we use Virtex-6 and Artix-7 evaluation boards. It is shown that this proposal is not vulnerable to the attacks mentioned previously. Further, a comparison was made with other related works, which use the same family of FPGAs. These comparisons show that this proposal not only defeats physical attack but also reduces the number of resources. For instance, the present work reduces the Look-Up Tables by 3550 and the number of Flip-Flops was decreased by 62,583 compared with other works. Besides, the number of memory blocks used is zero in the present work, in contrast with others that use a large number of blocks. Finally, the clock cycles (latency) are compared in different programmable devices to perform operations. |
format | Online Article Text |
id | pubmed-9698026 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96980262022-11-26 SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA Morales Romero, José de Jesús Reyes Barranca, Mario Alfredo Tinoco Varela, David Flores Nava, Luis Martin Espinosa Garcia, Emilio Rafael Micromachines (Basel) Article Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a modification of a modular exponentiation algorithm implemented in programmable devices, such as the Field Programmable Gate Array, for which we use Virtex-6 and Artix-7 evaluation boards. It is shown that this proposal is not vulnerable to the attacks mentioned previously. Further, a comparison was made with other related works, which use the same family of FPGAs. These comparisons show that this proposal not only defeats physical attack but also reduces the number of resources. For instance, the present work reduces the Look-Up Tables by 3550 and the number of Flip-Flops was decreased by 62,583 compared with other works. Besides, the number of memory blocks used is zero in the present work, in contrast with others that use a large number of blocks. Finally, the clock cycles (latency) are compared in different programmable devices to perform operations. MDPI 2022-10-30 /pmc/articles/PMC9698026/ /pubmed/36363893 http://dx.doi.org/10.3390/mi13111872 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Morales Romero, José de Jesús Reyes Barranca, Mario Alfredo Tinoco Varela, David Flores Nava, Luis Martin Espinosa Garcia, Emilio Rafael SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title | SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title_full | SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title_fullStr | SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title_full_unstemmed | SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title_short | SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA |
title_sort | sca-safe implementation of modified samal2r algorithm in fpga |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698026/ https://www.ncbi.nlm.nih.gov/pubmed/36363893 http://dx.doi.org/10.3390/mi13111872 |
work_keys_str_mv | AT moralesromerojosedejesus scasafeimplementationofmodifiedsamal2ralgorithminfpga AT reyesbarrancamarioalfredo scasafeimplementationofmodifiedsamal2ralgorithminfpga AT tinocovareladavid scasafeimplementationofmodifiedsamal2ralgorithminfpga AT floresnavaluismartin scasafeimplementationofmodifiedsamal2ralgorithminfpga AT espinosagarciaemiliorafael scasafeimplementationofmodifiedsamal2ralgorithminfpga |