Cargando…

SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA

Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a...

Descripción completa

Detalles Bibliográficos
Autores principales: Morales Romero, José de Jesús, Reyes Barranca, Mario Alfredo, Tinoco Varela, David, Flores Nava, Luis Martin, Espinosa Garcia, Emilio Rafael
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698026/
https://www.ncbi.nlm.nih.gov/pubmed/36363893
http://dx.doi.org/10.3390/mi13111872
_version_ 1784838713238355968
author Morales Romero, José de Jesús
Reyes Barranca, Mario Alfredo
Tinoco Varela, David
Flores Nava, Luis Martin
Espinosa Garcia, Emilio Rafael
author_facet Morales Romero, José de Jesús
Reyes Barranca, Mario Alfredo
Tinoco Varela, David
Flores Nava, Luis Martin
Espinosa Garcia, Emilio Rafael
author_sort Morales Romero, José de Jesús
collection PubMed
description Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a modification of a modular exponentiation algorithm implemented in programmable devices, such as the Field Programmable Gate Array, for which we use Virtex-6 and Artix-7 evaluation boards. It is shown that this proposal is not vulnerable to the attacks mentioned previously. Further, a comparison was made with other related works, which use the same family of FPGAs. These comparisons show that this proposal not only defeats physical attack but also reduces the number of resources. For instance, the present work reduces the Look-Up Tables by 3550 and the number of Flip-Flops was decreased by 62,583 compared with other works. Besides, the number of memory blocks used is zero in the present work, in contrast with others that use a large number of blocks. Finally, the clock cycles (latency) are compared in different programmable devices to perform operations.
format Online
Article
Text
id pubmed-9698026
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96980262022-11-26 SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA Morales Romero, José de Jesús Reyes Barranca, Mario Alfredo Tinoco Varela, David Flores Nava, Luis Martin Espinosa Garcia, Emilio Rafael Micromachines (Basel) Article Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such operation. In this work, we present a modification of a modular exponentiation algorithm implemented in programmable devices, such as the Field Programmable Gate Array, for which we use Virtex-6 and Artix-7 evaluation boards. It is shown that this proposal is not vulnerable to the attacks mentioned previously. Further, a comparison was made with other related works, which use the same family of FPGAs. These comparisons show that this proposal not only defeats physical attack but also reduces the number of resources. For instance, the present work reduces the Look-Up Tables by 3550 and the number of Flip-Flops was decreased by 62,583 compared with other works. Besides, the number of memory blocks used is zero in the present work, in contrast with others that use a large number of blocks. Finally, the clock cycles (latency) are compared in different programmable devices to perform operations. MDPI 2022-10-30 /pmc/articles/PMC9698026/ /pubmed/36363893 http://dx.doi.org/10.3390/mi13111872 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Morales Romero, José de Jesús
Reyes Barranca, Mario Alfredo
Tinoco Varela, David
Flores Nava, Luis Martin
Espinosa Garcia, Emilio Rafael
SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title_full SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title_fullStr SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title_full_unstemmed SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title_short SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA
title_sort sca-safe implementation of modified samal2r algorithm in fpga
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698026/
https://www.ncbi.nlm.nih.gov/pubmed/36363893
http://dx.doi.org/10.3390/mi13111872
work_keys_str_mv AT moralesromerojosedejesus scasafeimplementationofmodifiedsamal2ralgorithminfpga
AT reyesbarrancamarioalfredo scasafeimplementationofmodifiedsamal2ralgorithminfpga
AT tinocovareladavid scasafeimplementationofmodifiedsamal2ralgorithminfpga
AT floresnavaluismartin scasafeimplementationofmodifiedsamal2ralgorithminfpga
AT espinosagarciaemiliorafael scasafeimplementationofmodifiedsamal2ralgorithminfpga