Abstract
Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential. The verification step of the multi-user applications like OTT(over-the-top) platforms has modular-multi exponentiation(MME) as its vital operation. This article presents an efficient MME which uses Multiplication and Forwarding technique (MFW). MFW technique efficiently computes the MME and also avoids side-channel attacks (SCAs) using the integrated multi-level confusion mechanisms. Mostly, SCAs are secured by hardware means only. This article presents a novel algorithmic way of counteracting the SCAs. The proposed technique is more efficient (efficiency 1.109) than the state-of-the-art. Another advantage of the designed MFW MME technique is that it is directly implementable in hardware. We have implemented the techniques on FPGA using Vivado 21.2 on Virtex-7 evaluation boards. The compatibility has also been verified using Cadence for ASIC.
Similar content being viewed by others
References
Anderson, DR (2007) Model based inference in the life sciences: a primer on evidence (Springer Science & Business Media, 2007)
Attias, V, Vigneri, L, Dimitrov, V (2020) Preventing denial of service attacks in iot networks through verifiable delay functions. arXiv:2006.01977
Attias V, Vigneri L, Dimitrov V (2022) Rethinking modular multiexponentiation in real-world applications. J Cryptographic Eng pp 1–14
Boneh, D, Bonneau, J, Bünz, B, Fisch, B (2018) in Annual international cryptology conference (Springer, 2018), pp 757–788
Borges F, Lara P, Portugal R (2017) Parallel algorithms for modular multiexponentiation. Appl Math Comput 292:406–416
Gornik A, Moradi A, Oehm J, Paar C (2015) A hardware-based countermeasure to reduce side-channel leakage: Design, implementation, and evaluation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(8):1308–1319
Harn L (1998) Batch verifying multiple dsa-type digital signatures. Electron Lett 34(9):870–871
Nist, A (1991) proposed federal information processing standard for digital signature standard (dss). Fed Regist 56(1692):42,980–42,982
Pekmestzi K (1989) Complex number multipliers. Computers and Digital Techniques, IEE Proceedings E 136(1):70–75
Ramezanpour K, Ampadu P, Diehl W (2020) In: 2020 IEEE international symposium on hardware oriented security and trust (HOST) (IEEE, 2020), pp 176–187
Saha S, Jap D, Roy DB, Chakraborty A, Bhasin S, Mukhopadhyay D (2019) A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction. IEEE Trans Inf Forensic Secur 15:1905–1919
Sayakkara A, Le-Khac NA, Scanlon M (2019) A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit Investig 29:43–54
Schnorr, CP (1991) Efficient signature generation by smart cards. J Cryptology 4(3):161–174
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Shao Z (2001) Batch verifying multiple dsa-type digital signatures. Comput Netw 37(3–4):383–389
Sun Y, Wu Q, Liu J, Liu J, Huang X, Qin B, Hu W (2016) In: Australasian conference on information security and privacy (Springer, 2016), pp 310–326
Wei, L, Luo, B, Li, Y, Liu, Y, Xu, Q (2018) In: Proceedings of the 34th Annual computer security applications conference, pp 393–406
Xia F, Rafiev A, Aalsaud A, Al-Hayanni M, Davis J, Levine J, Mokhov A, Romanovsky A, Shafik R, Yakovlev A, Yang S (2017) Voltage, throughput, power, reliability, and multicore scaling. Computer, 50(8):34–45. https://doi.org/10.1109/MC.2017.3001246
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interest
No, All the Authors declare that the we have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tiwari, U., Vollala, S., N, R. et al. Improving the performance of authentication protocols using efficient modular multi exponential technique. Multimed Tools Appl 83, 11061–11076 (2024). https://doi.org/10.1007/s11042-023-15726-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15726-x