Short-Iteration Constant-Time GCD and Modular Inversion

被引:1
|
作者
Jin, Yaoan [1 ]
Miyaji, Atsuko [1 ,2 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita, Osaka, Japan
[2] Japan Adv Inst Sci & Technol, Nomi, Japan
关键词
Constant-Time Modular Inversion (CTMI); Constant-Time Greatest Common Divisor (CT-GCD); Side Channel Attack (SCA);
D O I
10.1007/978-3-031-25319-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even theoretically secure cryptosystems, digital signatures, etc. may not be secure after being implemented on the Internet of Things (IoT) devices and PCs because of Side-Channel Attack (SCA). Since RSA key generation and ECDSA need GCD computations or modular inversions, which are often computed by Binary Euclidean Algorithm (BEA) or Binary Extended Euclidean Algorithm (BEEA), the SCA weakness of BEA and BEEA becomes serious. For countermeasures, the Constant-Time GCD (CT-GCD) and Constant-Time Modular Inversion (CTMI) algorithms are good choices. Modular inversion based on Fermat's Little Theorem (FLT) can work in constant time but it is not efficient for general inputs. Two CTMI algorithms, named BOS and BY in this paper, are proposed by Joppe W. Bos and Bernstein, Yang respectively, which are based on the idea of BEA. However, BOS has complicated computations during one iteration and BY uses more iterations. Small number of iterations and simple computations during one iteration are good characteristics of a constant-time algorithm. Based on this view, this paper proposes new short-iteration CT-GCD and CTMI algorithms over F-p borrowing a simple idea of BEA. Our algorithms are evaluated from the theoretical point of view. Compared with BOS, BY and the improved version of BY, our short-iteration algorithms are experimentally demonstrated to be faster than theirs.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 50 条
  • [1] Compact and Efficient Constant-Time GCD and Modular Inversion with Short-Iteration
    Jin, Yaoan
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (09) : 1397 - 1406
  • [2] Fast constant-time gcd computation and modular inversion
    Bernstein D.J.
    Yang B.-Y.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (03): : 340 - 398
  • [3] Constant time modular inversion
    Bos, Joppe W.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) : 275 - 281
  • [4] Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications
    Sghaier, Anissa
    Zeghid, Medien
    Massoud, Chiraz
    Ahmed, Hassan Yousif
    Chehri, Abdellah
    Machhout, Mohsen
    SENSORS, 2022, 22 (07)
  • [5] Constant-time sorting
    Brand, Michael
    INFORMATION AND COMPUTATION, 2014, 237 : 142 - 150
  • [6] A Comprehensive Analysis of Constant-time Polynomial Inversion for Post-quantum Cryptosystems
    Barenghi, Alessandro
    Pelosi, Gerardo
    17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020), 2020, : 269 - 276
  • [7] QDI Constant-Time Counters
    Bingham, Ned
    Manohar, Rajit
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (01) : 83 - 91
  • [8] Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications
    Deshpande, Sanjay
    del Pozo, Santos Merino
    Mateu, Victor
    Manzano, Marc
    Aaraj, Najwa
    Szefer, Jakub
    2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021), 2021, : 122 - 129
  • [9] Verifying Constant-Time Implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    Emmi, Michael
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 53 - 70
  • [10] Constant-time query processing
    Raman, Vijayshankar
    Swart, Garret
    Qiao, Lin
    Reiss, Frederick
    Dialani, Vijay
    Kossmann, Donald
    Narang, Inderpal
    Sidle, Richard
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 60 - +