Short-Iteration Constant-Time GCD and Modular Inversion

被引:1
|
作者
Jin, Yaoan [1 ]
Miyaji, Atsuko [1 ,2 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita, Osaka, Japan
[2] Japan Adv Inst Sci & Technol, Nomi, Japan
关键词
Constant-Time Modular Inversion (CTMI); Constant-Time Greatest Common Divisor (CT-GCD); Side Channel Attack (SCA);
D O I
10.1007/978-3-031-25319-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even theoretically secure cryptosystems, digital signatures, etc. may not be secure after being implemented on the Internet of Things (IoT) devices and PCs because of Side-Channel Attack (SCA). Since RSA key generation and ECDSA need GCD computations or modular inversions, which are often computed by Binary Euclidean Algorithm (BEA) or Binary Extended Euclidean Algorithm (BEEA), the SCA weakness of BEA and BEEA becomes serious. For countermeasures, the Constant-Time GCD (CT-GCD) and Constant-Time Modular Inversion (CTMI) algorithms are good choices. Modular inversion based on Fermat's Little Theorem (FLT) can work in constant time but it is not efficient for general inputs. Two CTMI algorithms, named BOS and BY in this paper, are proposed by Joppe W. Bos and Bernstein, Yang respectively, which are based on the idea of BEA. However, BOS has complicated computations during one iteration and BY uses more iterations. Small number of iterations and simple computations during one iteration are good characteristics of a constant-time algorithm. Based on this view, this paper proposes new short-iteration CT-GCD and CTMI algorithms over F-p borrowing a simple idea of BEA. Our algorithms are evaluated from the theoretical point of view. Compared with BOS, BY and the improved version of BY, our short-iteration algorithms are experimentally demonstrated to be faster than theirs.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 50 条
  • [21] Constant-Time Dynamic (Δ+1)-Coloring
    Henzinger, Monika
    Peng, Pan
    37TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2020), 2020, 154
  • [22] CONSTANT-TIME MAINTAINABILITY - A GENERALIZATION OF INDEPENDENCE
    WANG, KE
    GRAHAM, MH
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1992, 17 (02): : 201 - 246
  • [23] CONSTANT-TIME SORTING ON RECONFIGURABLE MESHES
    CHEN, YC
    CHEN, WT
    IEEE TRANSACTIONS ON COMPUTERS, 1994, 43 (06) : 749 - 751
  • [24] Constant-Time Algorithms for Sparsity Matroids
    Ito, Hiro
    Tanigawa, Shin-Ichi
    Yoshida, Yuichi
    AUTOMATA, LANGUAGES, AND PROGRAMMING, ICALP 2012 PT I, 2012, 7391 : 498 - 509
  • [25] Constant-Time Local Computation Algorithms
    Mansour, Yishay
    Patt-Shamir, Boaz
    Vardi, Shai
    THEORY OF COMPUTING SYSTEMS, 2018, 62 (02) : 249 - 267
  • [26] Constant-Time Callees with Variable-Time Callers
    Garcia, Cesar Pereida
    Brumley, Billy Bob
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 83 - 98
  • [27] Constant-Time Foundations for the New Spectre Era
    Cauligi, Sunjay
    Disselkoen, Craig
    Gleissenthall, Klaus, V
    Tullsen, Dean
    Stefan, Deian
    Rezk, Tamara
    Barthe, Gilles
    PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20), 2020, : 913 - 926
  • [28] Verifying constant-time implementations by abstract interpretation
    Blazy, Sandrine
    Pichardie, David
    Trieu, Alix
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (01) : 137 - 163
  • [29] Decentralized Fault Diagnosis for Constant-Time Automata
    Miao, Shaowen
    Lai, Aiwen
    Komenda, Jan
    Lahaye, Sebastien
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 3392 - 3397
  • [30] Constant-Time Predictive Distributions for Gaussian Processes
    Pleiss, Geoff
    Gardner, Jacob R.
    Weinberger, Kilian Q.
    Wilson, Andrew Gordon
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80