Short-Iteration Constant-Time GCD and Modular Inversion

被引:1
|
作者
Jin, Yaoan [1 ]
Miyaji, Atsuko [1 ,2 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita, Osaka, Japan
[2] Japan Adv Inst Sci & Technol, Nomi, Japan
关键词
Constant-Time Modular Inversion (CTMI); Constant-Time Greatest Common Divisor (CT-GCD); Side Channel Attack (SCA);
D O I
10.1007/978-3-031-25319-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Even theoretically secure cryptosystems, digital signatures, etc. may not be secure after being implemented on the Internet of Things (IoT) devices and PCs because of Side-Channel Attack (SCA). Since RSA key generation and ECDSA need GCD computations or modular inversions, which are often computed by Binary Euclidean Algorithm (BEA) or Binary Extended Euclidean Algorithm (BEEA), the SCA weakness of BEA and BEEA becomes serious. For countermeasures, the Constant-Time GCD (CT-GCD) and Constant-Time Modular Inversion (CTMI) algorithms are good choices. Modular inversion based on Fermat's Little Theorem (FLT) can work in constant time but it is not efficient for general inputs. Two CTMI algorithms, named BOS and BY in this paper, are proposed by Joppe W. Bos and Bernstein, Yang respectively, which are based on the idea of BEA. However, BOS has complicated computations during one iteration and BY uses more iterations. Small number of iterations and simple computations during one iteration are good characteristics of a constant-time algorithm. Based on this view, this paper proposes new short-iteration CT-GCD and CTMI algorithms over F-p borrowing a simple idea of BEA. Our algorithms are evaluated from the theoretical point of view. Compared with BOS, BY and the improved version of BY, our short-iteration algorithms are experimentally demonstrated to be faster than theirs.
引用
收藏
页码:82 / 99
页数:18
相关论文
共 50 条
  • [41] IODINE: Verifying Constant-Time Execution of Hardware
    v Gleissenthall, Klaus
    Kici, Rami Gokhan
    Stefan, Deian
    Jhala, Ranjit
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1411 - 1428
  • [42] A CHARACTERIZATION OF CONSTANT-TIME CELLULAR AUTOMATA COMPUTATION
    KIM, S
    MCCLOSKEY, R
    PHYSICA D-NONLINEAR PHENOMENA, 1990, 45 (1-3) : 404 - 419
  • [43] Verifying Constant-Time Implementations by Abstract Interpretation
    Blazy, Sandrine
    Pichardie, David
    Trieu, Alix
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 260 - 277
  • [44] Fully Projective Radical Isogenies in Constant-Time
    Chi-Dominguez, Jesus-Javier
    Reijnders, Krijn
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 73 - 95
  • [45] A Constant-Time Algorithm for Finding Neighbors in Quadtrees
    Aizawa, Kunio
    Tanaka, Shojiro
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2009, 31 (07) : 1178 - 1183
  • [46] Constant-Time Updates Using Token Mechanics
    Banescu, Sebastian
    Derka, Martin
    Gorzny, Jan
    Lee, Sung-Shine
    Murashkin, Alex
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 300 - 304
  • [47] APPLICATIONS OF RECONFIGURABLE MESHES TO CONSTANT-TIME COMPUTATIONS
    OLARIU, S
    SCHWING, JL
    ZHANG, JY
    PARALLEL COMPUTING, 1993, 19 (02) : 229 - 237
  • [48] Constant-Time Admission Control for Partitioned EDF
    Masrur, Alejandro
    Chakraborty, Samarjit
    Faerber, Georg
    22ND EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2010), 2010, : 34 - 43
  • [49] FaCT: A Flexible, Constant-Time Programming Language
    Cauligi, Sunjay
    Soeller, Gary
    Brown, Fraser
    Johannesmeyer, Brian
    Huang, Yunlu
    Jhala, Ranjit
    Stefan, Deian
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 69 - 76
  • [50] A Look-up Table based Binary GCD for Fast Modular Inversion
    Ishida, Tsutomu
    Nagase, Tomoyuki
    Yoshioka, Yoshio
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (08): : 2901 - 2910