Efficient Randomized Regular Modular Exponentiation using Combined
Montgomery and Barrett Multiplications
Andrea Lesavourey
1
, Christophe Negre
1
and Thomas Plantard
2
1
DALI (UPVD) and LIRMM (Univ. of Montpellier, CNRS), Perpignan, France
2
CCISR, SCIT, University of Wollongong, Wollongong, Australia
Keywords:
RSA, Modular Exponentiation, Barrett, Montgomery, Differential Power Analysis, Correlation Power
Analysis, Randomization.
Abstract:
Cryptographic operations performed on an embedded device are vulnerable to side channel analysis and partic-
ularly to differential and correlation power analysis. The basic protection against such attacks is to randomize
the data all along the cryptographic computations. In this paper we present a modular multiplication algorithm
which can be used for randomization. We show that we can use it to randomize the modular exponentia-
tion of the RSA cryptosystem. The proposed randomization is free of computation and induces a level of
randomization from 2
10
to 2
15
for practical RSA modulus size.
1 INTRODUCTION
Modern digital communications are intensively en-
crypted and authenticated to ensure a good level of
confidentiality and security. Public key encryption
and signature is a concept initiated in 1976 by Diffie
and Hellman. This concept was realized by Rivest
Shamir and Adlemann who proposed the RSA cryp-
tosystem in (Rivest et al., 1978). This RSA cryptosys-
tem is nowadays the most used public key scheme for
electronic signature and remote authentication.
The basic operation in RSA protocols is an expo-
nentiation modulo a integer N which is of size 2048-
4096 bits. This exponentiation is generally com-
puted through a sequence of a few thousands squar-
ings and multiplications modulo N using the Square-
and-multiplication exponentiation scheme. Unfortu-
nately, a naive implementation of this algorithm on
an embedded device could be threaten by side chan-
nel analysis. These attacks monitor either power con-
sumption (Kocher et al., 1999), electromagnetic ema-
nation (Mangard, 2003) or computation time (Kocher,
1996) in order to extract the secret exponent.
The kind of attacks we will consider here are the
simple power analysis (SPA) (Kocher et al., 1999), the
differential and correlation power analysis (Kocher
et al., 1999; Brier et al., 2004). The SPA can be eas-
ily defeated by using a regular algorithm for the ex-
ponentiation like the Montgomery-ladder (Joye and
Yen, 2002) or the Square-and-multiply-always algo-
rithm (Coron, 1999). To counteract the differential
and correlation power analysis it is necessary to ran-
domize the data and the computations all along the
exponentiation.
In this paper we study a new method to randomize
modular exponentiation. This approach is based on
a modular multiplication algorithm which randomly
combines the two main methods for modular multi-
plication: Montgomery (Montgomery, 1985) and Bar-
rett multiplications (Barrett, 1987). The advantage of
this proposed randomization is that it is free of com-
putation. We then present a modified Montgomery-
ladder and a modified Square-and-multiply-always al-
gorithms for modular exponentiation which uses this
randomized modular multiplication. For these two
proposed randomized exponentiations we study the
level of randomization obtained.
The remainder of the paper is organized as fol-
lows. In Section 2 we review modular exponentiation
and side channel analysis. In Section 3 we review
the methods of Montgomery and Barrett for mod-
ular multiplication and we present a combined ver-
sion of these two methods. In Section 4 we study
two randomized exponentiations based on the com-
bined Montgomery and Barrett multiplication. Fi-
nally, in Section 5, we give some concluding remarks
and some perspectives.
368
Lesavourey, A., Negre, C. and Plantard, T.
Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications.
DOI: 10.5220/0005998503680375
In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, pages 368-375
ISBN: 978-989-758-196-0
Copyright
c
2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved