Abstract
Following requirements are necessary when implementing public key cryptography in a mobile telecommunication terminal. (1) simultaneous highspeed double modular exponentiation calculation, (2) small size and low power consumption, (3) resistance to side channel attacks. We have developed a coprocessor that provides these requirements. In this coprocessor, right-to-left binary exponentiation algorithm was extended for double modular exponentiations by designing new circuit configuration and new schedule control methods. We specified the desired power consumption of the circuit at the initial design stage. Our proposed method resists side channel attacks that extract secret exponent by analyzing the target’s power consumption and calculation time.
Chapter PDF
References
K. Nyberg, A. Rueppel, “Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem”, Advanced in Cryptology-EUROCRYPT’ 94, Springer-Verlag.
R. Cramer, V. Shoup, “A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack”, Lecture Note in Computer Science. Advanced in Cryptology-CRYPTO’98, Springer-Verlag, pp.13–25.
J. Anzai, N. Matsuzaki, T. Matsumoto, “A Quick Group Key Distribution Scheme with Entity Revocation”, Advanced in Cryptology-ASIACRYPTO’99, Springer-Verlag, pp. 333–347.
N. Matsuzaki, J. Anzai, T. Matsumoto, “Light Weight Broadcast Exclusion using Secret Sharing”, Fifth Australasian Conference on Information Security and Privacy, Springer-Verlag, pp. 313–327.
P. C. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems”, Advanced in Cryptology-CRYPTO’96, Springer-Verlag, pp.104–113.
T. S. Messerges, E. A. Dabbish, R. H. Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards”, Cryptographic Hardware and Embedded Systems-CHES’99, Springer-Verlag, 1999, pp. 144–157.
L. Goubin, J. Patarin, “DES and Differential Power Analysis: The Duplication Method”, Cryptographic Hardware and Embedded Systems-CHES’99, Springer-Verlag, 1999, pp.158–172.
H. Handschuh, P. Paillier, J. Stern, “Probing Attacks on Tamper-Resistant Devices”, Cryptographic Hardware and Embedded Systems-CHES’99, Springer-Verlag, 1999, pp.303–315.
A. Andreasyan, G. Khachatrian, “New Double Exponentiation Algorithms”, Third International Workshop on practice and Theory in Public Key Cryptography PKC2000, The Poster Papers Collection p.9–15, ISBN 0-73262-130-5, Monash Univ.
A. J. Menezes, P. C. Oorchot, S. A. Vanstone, “HANDBOOK of APPLIED CRYPTOGRAPHY”, CRC press, pp.614–615, pp.620-627.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kato, T., Ito, S., Anzai, J., Matsuzaki, N. (2000). A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_16
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive