Next Article in Journal
Optimization of AZ91D Process and Corrosion Resistance Using Wire Arc Additive Manufacturing
Next Article in Special Issue
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure
Previous Article in Journal
Anomalous Increase in Specific Heat of Binary Molten Salt-Based Graphite Nanofluids for Thermal Energy Storage
Article Menu
Issue 8 (August) cover image

Export Article

Open AccessArticle
Appl. Sci. 2018, 8(8), 1304; https://doi.org/10.3390/app8081304

Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks

School of Computer and Information Engineering, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Korea
Received: 5 July 2018 / Revised: 26 July 2018 / Accepted: 3 August 2018 / Published: 5 August 2018
(This article belongs to the Special Issue Side Channel Attacks)
Full-Text   |   PDF [293 KB, uploaded 5 August 2018]   |  

Abstract

Constant-time technique is of crucial importance to prevent secrets of cryptographic algorithms from leakage by cache attacks. In this paper, we propose Permute-Scatter-Gather, a novel constant-time method for the modular exponentiation that is used in the RSA cryptosystem. On the basis of the scatter-gather design, our method utilizes pseudo-random permutation to obfuscate memory access patterns. Based on this strategy, the resistance against fine-grained cache attacks is ensured, i.e., providing the higher level of security than the existing scatter-gather implementations. Evaluation shows that our method outperforms the OpenSSL library at most 11% in the mainstream Intel processors. View Full-Text
Keywords: cache attack; cache side-channel attack; constant-time cryptographic algorithm; rsa cryptosystem; scatter-gather implementation; modular exponentiation cache attack; cache side-channel attack; constant-time cryptographic algorithm; rsa cryptosystem; scatter-gather implementation; modular exponentiation
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Shin, Y. Fast and Secure Implementation of Modular Exponentiation for Mitigating Fine-Grained Cache Attacks. Appl. Sci. 2018, 8, 1304.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top