Skip to main content
Log in

Improving the performance of authentication protocols using efficient modular multi exponential technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Efficient and secure authentication of the user in today’s world, where most of the multimedia data is shared over the public network, is essential. The verification step of the multi-user applications like OTT(over-the-top) platforms has modular-multi exponentiation(MME) as its vital operation. This article presents an efficient MME which uses Multiplication and Forwarding technique (MFW). MFW technique efficiently computes the MME and also avoids side-channel attacks (SCAs) using the integrated multi-level confusion mechanisms. Mostly, SCAs are secured by hardware means only. This article presents a novel algorithmic way of counteracting the SCAs. The proposed technique is more efficient (efficiency 1.109) than the state-of-the-art. Another advantage of the designed MFW MME technique is that it is directly implementable in hardware. We have implemented the techniques on FPGA using Vivado 21.2 on Virtex-7 evaluation boards. The compatibility has also been verified using Cadence for ASIC.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Anderson, DR (2007) Model based inference in the life sciences: a primer on evidence (Springer Science & Business Media, 2007)

  2. Attias, V, Vigneri, L, Dimitrov, V (2020) Preventing denial of service attacks in iot networks through verifiable delay functions. arXiv:2006.01977

  3. Attias V, Vigneri L, Dimitrov V (2022) Rethinking modular multiexponentiation in real-world applications. J Cryptographic Eng pp 1–14

  4. Boneh, D, Bonneau, J, Bünz, B, Fisch, B (2018) in Annual international cryptology conference (Springer, 2018), pp 757–788

  5. Borges F, Lara P, Portugal R (2017) Parallel algorithms for modular multiexponentiation. Appl Math Comput 292:406–416

    MathSciNet  Google Scholar 

  6. Gornik A, Moradi A, Oehm J, Paar C (2015) A hardware-based countermeasure to reduce side-channel leakage: Design, implementation, and evaluation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(8):1308–1319

    Article  Google Scholar 

  7. Harn L (1998) Batch verifying multiple dsa-type digital signatures. Electron Lett 34(9):870–871

    Article  Google Scholar 

  8. Nist, A (1991) proposed federal information processing standard for digital signature standard (dss). Fed Regist 56(1692):42,980–42,982

  9. Pekmestzi K (1989) Complex number multipliers. Computers and Digital Techniques, IEE Proceedings E 136(1):70–75

  10. Ramezanpour K, Ampadu P, Diehl W (2020) In: 2020 IEEE international symposium on hardware oriented security and trust (HOST) (IEEE, 2020), pp 176–187

  11. Saha S, Jap D, Roy DB, Chakraborty A, Bhasin S, Mukhopadhyay D (2019) A framework to counter statistical ineffective fault analysis of block ciphers using domain transformation and error correction. IEEE Trans Inf Forensic Secur 15:1905–1919

    Article  Google Scholar 

  12. Sayakkara A, Le-Khac NA, Scanlon M (2019) A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit Investig 29:43–54

    Article  Google Scholar 

  13. Schnorr, CP (1991) Efficient signature generation by smart cards. J Cryptology 4(3):161–174

  14. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  15. Shao Z (2001) Batch verifying multiple dsa-type digital signatures. Comput Netw 37(3–4):383–389

  16. Sun Y, Wu Q, Liu J, Liu J, Huang X, Qin B, Hu W (2016) In: Australasian conference on information security and privacy (Springer, 2016), pp 310–326

  17. Wei, L, Luo, B, Li, Y, Liu, Y, Xu, Q (2018) In: Proceedings of the 34th Annual computer security applications conference, pp 393–406

  18. Xia F, Rafiev A, Aalsaud A, Al-Hayanni M, Davis J, Levine J, Mokhov A, Romanovsky A, Shafik R, Yakovlev A, Yang S (2017) Voltage, throughput, power, reliability, and multicore scaling. Computer, 50(8):34–45. https://doi.org/10.1109/MC.2017.3001246

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satyanarayana Vollala.

Ethics declarations

Competing Interest

No, All the Authors declare that the we have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tiwari, U., Vollala, S., N, R. et al. Improving the performance of authentication protocols using efficient modular multi exponential technique. Multimed Tools Appl 83, 11061–11076 (2024). https://doi.org/10.1007/s11042-023-15726-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15726-x

Keywords

Navigation