Efficient CRT-Based RSA Cryptosystems

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Midterm Review Cryptography & Network Security
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Key management issues in PGP
Overview Modern public-key cryptosystems: RSA
Public Key Cryptography
CS480 Cryptography and Information Security
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Public Key Encryption Systems
Introduction Used for communication to verify
Public-Key Cryptography and RSA
Public-key Cryptography
Cryptography.
Sindhusha Doddapaneni
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Last Updated: Oct 14, 2017.
NET 311 Information Security
ICS 454 Principles of Cryptography
Security through Encryption
Security in Network Communications
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
The Application of Elliptic Curves Cryptography in Embedded Systems
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
ICS 454 Principles of Cryptography
NET 311 Information Security
Cryptography Reference: Network Security
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
CDK: Chapter 7 TvS: Chapter 9
Chapter 29 Cryptography and Network Security
Introduction to Cryptography
Public Key Encryption Systems
Diffie-Hellman Key Exchange
Secure Diffie-Hellman Algorithm
Presentation transcript:

Efficient CRT-Based RSA Cryptosystems Immune against the Hardware Fault Attack and the FPGA Implementations Yonghong Yang Supervisors: Prof. Z. Abid & Prof. W. Wang Department of Electrical and Computer Engineering the University of Western Ontario, Canada November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

Introduction Network security is needed everywhere: November-15-18

Introduction Wide applications need security Electronic banking and voting Electronic commerce, such as online bidding Email, file exchange/submission Web browsing, etc. November-15-18

Introduction Cryptography Cryptography guarantees the needed security The mathematical science to secure the confidentiality/authentication of data by replacing them with a transformed version Two types: secret-key and public-key Cryptography guarantees the needed security Privacy or confidentiality Data integrity Authentication Non-repudiation November-15-18

Introduction Secret-Key Cryptography Disadvantages: Traditional method of cryptography Theoretical basis: “communication theory of secrecy systems” Single key is used to encrypt and decrypt texts DES, NSA and IDEA etc. Disadvantages: Difficult key management Keys need to be changed frequently Cannot yield efficient signature mechanisms November-15-18

Introduction Public-Key Cryptography Relatively new field – 1975, initiated by the paper “New directions in cryptography ” Different keys are used for encryption and decryption RSA, DSA, DSS etc. November-15-18

Introduction Public-Key Cryptography Advantages: Disadvantage: Easier key management Key can remain unchanged for longer time Yields efficient digital signature mechanisms Disadvantage: Slower throughputs since keys have larger wordlengths November-15-18

Introduction RSA Cryptography One of the most widely used, simplest public- key cryptography so far Scheme Alice Bob Encrypt using B’s public key Decrypt using by B’s private key Sign with A’s private key Check signature by A’s public key November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

Literature Review RSA Cryptosystem Public quantities: n, e; secret quantities: d, Encryption/decryption: Encryption: Decryption: Signing/signature verification: Signing: Signature verification: November-15-18

Literature Review Chinese Remainder Theorem Based RSA Chinese Remainder Theorem is often used to speedup the operations of RSA Attacks on the CRT-based RSA Hardware fault attack Timing attack Power attack November-15-18

Literature Review Countermeasures to the attack Padding the message, drawback: collision-free hash function (hard) Checking the intermediate or final results, drawback: double the operational time and not secure Revising the signature expression, make sure no secret information is leaked November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

Proposed Two-Prime RSA Standard CRT-based two-prime RSA To calculate: November-15-18

Proposed Two-Prime RSA Standard CRT-based two-prime RSA Vulnerable to the hardware fault attack: When available: and factors the system November-15-18

Proposed Two-Prime RSA CRT-2 protocol proposed by Yen et al. 1. 2. 3. where November-15-18

Proposed Two-Prime RSA 1. 2. 3. where November-15-18

Proposed Two-Prime RSA Block diagram of the proposed two-prime RSA November-15-18

Proposed Two-Prime RSA Comparison of the operational speed Division Modular exponentiation CRT-2 protocol by Yen. et al. The proposed two-prime RSA where ( ) , and November-15-18

Proposed Two-Prime RSA Factorization complexity The complexity of factoring the proposed RSA system: The complexity of factoring CRT-2: Similar November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

Proposed Multi-Prime RSA Standard CRT-based multi-prime RSA November-15-18

Proposed Multi-Prime RSA Immunity of CRT-based multi-prime RSA: When (j-1) faulty signatures available, calculations according to these (j-1) faulty signatures factors the multi-prime RSA Still vulnerable to the hardware fault attack November-15-18

Proposed Multi-Prime RSA 1. 2. 3. for November-15-18

Proposed Multi-Prime RSA The proposed multi-prime RSA November-15-18

Proposed Two-Prime RSA Extended CRT-2 protocol 1. 2. 3. for November-15-18

Proposed Multi-Prime RSA Comparison of the operational speed Division Modular exponentiation Extended CRT-2 protocol The proposed multi-prime RSA where ( , and ) November-15-18

Proposed Multi-Prime RSA Operational speed improvement has been verified by one example of three-prime RSA Similar factorization complexity Still for obtaining any factor from the proposed multi-prime RSA Predicted to use fewer hardware resources Will be verified by Implementation results later November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

FPGA Implementations Design flow November-15-18

FPGA Implementations Structure of modular exponentiation algorithm (to calculate ) November-15-18

FPGA Implementations Structure of Montgomery modular multiplication algorithm (to calculate ) November-15-18

FPGA Implementations Hardware structure of Montgomery modular multiplication November-15-18

FPGA Implementations Structure of proposed two-prime RSA November-15-18

FPGA Implementations Structure of standard CRT-based two-prime RSA November-15-18

FPGA Implementations Structure of CRT-2 protocol November-15-18

FPGA Implementations Implementa-tion results: CLB usage LUT Equivalent gates Standard CRT-based two-prime RSA 1,226 4,775 46,324 Proposed two-prime RSA 1,431 5,615 55,913 CRT-2 protocol 1,997 6,577 85,229 Standard three-prime RSA 1,759 6,939 68,144 Proposed three-prime RSA 2,130 8,252 82,233 Extended CRT-2 protocol 2,646 9,121 109,756 November-15-18

FPGA Implementations Implementation results Standard 2-prime Proposed (CRT-2) Resources Usage (%) 82.6 100 152 3-prime Resources usage (%) 82 133 Conclusion: Not many more resources than the standard CRT-based RSA and much fewer than the systems based on CRT-2 protocol November-15-18

Outline Introduction Literature Review Proposed Efficient Two-Prime RSA Cryptosystem Proposed Efficient Multi-Prime RSA Cryptosystem FPGA Implementations and Results Conclusions November-15-18

Conclusions Conclusions The immunity of the RSA cryptosystems against the hardware fault attack is greatly increased The proposed RSA cryptosystems provide more efficient operations than previous work, and they bear similar immunity against the hardware fault attack. The proposed RSA cryptosystems use fewer resources than previous work in hardware implementations The standard CRT-based RSA cryptosystems with more factors bears more difficult for the hardware fault attack November-15-18

Conclusions Future work Speed up the basic block: modular exponentiation computation Implement the RSA cryptosystems with enhanced immunity against other implementation attacks Download the RSA cryptosystems implemented in Chapter 5 to the FPGA chip November-15-18

Thesis Examination Thanks ! and Questions ? November-15-18