Skip to main content

16.03.2024 | Research Article

Energy efficient triple-modular exponential techniques for batch verification schemes

verfasst von: Satyanarayana Vollala

Erschienen in: Journal of Cryptographic Engineering

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the authentication protocols have modular multi-exponentiation (MME) as their core operation in the verification step. Triple modular-multi exponentiation playing a vital role in Batch verification schemes. This work proposes energy-efficient modular-multi exponential techniques that compute triple modular exponentiation. Two unique techniques are designed to calculate the MME with integrated confusion mechanisms in an efficient manner. The confusion factor has been introduced at two levels for improving security. Currently, the most common side-channel attacks (SCAs) are only hardware-secured. This article has also presents an algorithmic way of counteracting the SCAs. The results indicate that the throughput has increased by an order of 3.3% by reducing the power by 3.35% and saving the energy by an order of 3.35%. The proposed techniques are 72% more efficient(efficiency \(\eta =1.72\)) than the state-of-the-art. One of the significant contributions of the presented MME techniques is that they are hardware compatible. We have implemented the proposed techniques on FPGA using Vivado 22.2 on VC707 evaluation boards.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Azarderakhsh, R., Mozaffari-Kermani, M., Järvinen, K.: Secure and efficient architectures for single exponentiations in finite fields suitable for high-performance cryptographic applications. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(3), 332–340 (2015)CrossRef Azarderakhsh, R., Mozaffari-Kermani, M., Järvinen, K.: Secure and efficient architectures for single exponentiations in finite fields suitable for high-performance cryptographic applications. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(3), 332–340 (2015)CrossRef
2.
Zurück zum Zitat Bao, C., Srivastava, A.: A secure algorithm for task scheduling against side-channel attacks. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pp. 3–12 (2014) Bao, C., Srivastava, A.: A secure algorithm for task scheduling against side-channel attacks. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pp. 3–12 (2014)
3.
Zurück zum Zitat Bayrak, A.G., Regazzoni, F., Novo, D., Brisk, P., Standaert, F.-X., Ienne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2013)MathSciNetCrossRef Bayrak, A.G., Regazzoni, F., Novo, D., Brisk, P., Standaert, F.-X., Ienne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2013)MathSciNetCrossRef
4.
Zurück zum Zitat Borges, F., Lara, P., Portugal, R.: Parallel algorithms for modular multi-exponentiation. Appl. Math. Comput. 292, 406–416 (2017)MathSciNet Borges, F., Lara, P., Portugal, R.: Parallel algorithms for modular multi-exponentiation. Appl. Math. Comput. 292, 406–416 (2017)MathSciNet
5.
Zurück zum Zitat Chang, T.-J., Tan, K.-H., Huang, P.-S., Chen, C.-Y.: A strategy speeds up the triple modular exponentiation. In: International Conference on Digital Information Processing, Data Mining, and Wireless Communications, pp. 165–172 (2015) Chang, T.-J., Tan, K.-H., Huang, P.-S., Chen, C.-Y.: A strategy speeds up the triple modular exponentiation. In: International Conference on Digital Information Processing, Data Mining, and Wireless Communications, pp. 165–172 (2015)
6.
Zurück zum Zitat El Makkaoui, K., Lamriji, Y., Ouahbi, I., Nabil, O., Bouzahra, A., Beni-Hssane, A.: Fast modular exponentiation methods for public-key cryptography. In: 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–6. IEEE (2022) El Makkaoui, K., Lamriji, Y., Ouahbi, I., Nabil, O., Bouzahra, A., Beni-Hssane, A.: Fast modular exponentiation methods for public-key cryptography. In: 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–6. IEEE (2022)
7.
Zurück zum Zitat Gornik, A., Moradi, A., Oehm, J., Paar, C.: A hardware-based countermeasure to reduce side-channel leakage: design, implementation, and evaluation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8), 1308–1319 (2015)CrossRef Gornik, A., Moradi, A., Oehm, J., Paar, C.: A hardware-based countermeasure to reduce side-channel leakage: design, implementation, and evaluation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8), 1308–1319 (2015)CrossRef
8.
9.
Zurück zum Zitat Pekmestzi, K.: Complex number multipliers. IEE Proc. E Comput. Digit. Tech. 136(1), 70–75 (1989)CrossRef Pekmestzi, K.: Complex number multipliers. IEE Proc. E Comput. Digit. Tech. 136(1), 70–75 (1989)CrossRef
10.
Zurück zum Zitat Ramezanpour, K., Ampadu, P., Diehl, W.: Rs-mask: random space masking as an integrated countermeasure against power and fault analysis. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 176–187. IEEE (2020) Ramezanpour, K., Ampadu, P., Diehl, W.: Rs-mask: random space masking as an integrated countermeasure against power and fault analysis. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 176–187. IEEE (2020)
11.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef
12.
Zurück zum Zitat Saha, S., Jap, D., Roy, D.B., Chakraborty, A., Bhasin, S., Mukhopadhyay, D.: A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction. IEEE Trans. Inf. Forensics Secur. 15, 1905–1919 (2019)CrossRef Saha, S., Jap, D., Roy, D.B., Chakraborty, A., Bhasin, S., Mukhopadhyay, D.: A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction. IEEE Trans. Inf. Forensics Secur. 15, 1905–1919 (2019)CrossRef
13.
Zurück zum Zitat Sayakkara, A., Le-Khac, N.-A., Scanlon, M.: A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 29, 43–54 (2019)CrossRef Sayakkara, A., Le-Khac, N.-A., Scanlon, M.: A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 29, 43–54 (2019)CrossRef
14.
Zurück zum Zitat Sutter, G.D., Deschamps, J.-P., Imaňa, J.L.: Modular multiplication and exponentiation architectures for fast rsa cryptosystem based on digit serial computation. IEEE Trans. Ind. Electron. 58(7), 3101–3109 (2011)CrossRef Sutter, G.D., Deschamps, J.-P., Imaňa, J.L.: Modular multiplication and exponentiation architectures for fast rsa cryptosystem based on digit serial computation. IEEE Trans. Ind. Electron. 58(7), 3101–3109 (2011)CrossRef
15.
Zurück zum Zitat Wei, L., Luo, B., Li, Y., Liu, Y., Xu, Q.: I know what you see: power side-channel attack on convolutional neural network accelerators. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 393–406 (2018) Wei, L., Luo, B., Li, Y., Liu, Y., Xu, Q.: I know what you see: power side-channel attack on convolutional neural network accelerators. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 393–406 (2018)
16.
Zurück zum Zitat Xia, F., Rafiev, A., Aalsaud, A., Al-Hayanni, M., Davis, J., Levine, J., Mokhov, A., Romanovsky, A., Shafik, R., Yakovlev, A., Yang, S.: Voltage, throughput, power, reliability, and multicore scaling. Computer 50(8), 34–45 (2017)CrossRef Xia, F., Rafiev, A., Aalsaud, A., Al-Hayanni, M., Davis, J., Levine, J., Mokhov, A., Romanovsky, A., Shafik, R., Yakovlev, A., Yang, S.: Voltage, throughput, power, reliability, and multicore scaling. Computer 50(8), 34–45 (2017)CrossRef
17.
Zurück zum Zitat Yen, S.-M.: Improved common-multiplicand multiplication and fast exponentiation by exponent decomposition. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(6), 1160–1163 (1997) Yen, S.-M.: Improved common-multiplicand multiplication and fast exponentiation by exponent decomposition. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(6), 1160–1163 (1997)
18.
Zurück zum Zitat Zhou, Y., Fang, Y.: Multimedia broadcast authentication based on batch signature [advances in mobile multimedia]. IEEE Commun. Mag. 45(8), 72–77 (2007)CrossRef Zhou, Y., Fang, Y.: Multimedia broadcast authentication based on batch signature [advances in mobile multimedia]. IEEE Commun. Mag. 45(8), 72–77 (2007)CrossRef
Metadaten
Titel
Energy efficient triple-modular exponential techniques for batch verification schemes
verfasst von
Satyanarayana Vollala
Publikationsdatum
16.03.2024
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-024-00348-2

Premium Partner