SPA against an FPGA-B ased RSA implementation with a high-radix montgomery multiplier

Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh

Research output: Contribution to journalConference articlepeer-review

1 Citation (Scopus)

Abstract

Simple Power Analysis (SPA) was applied to an RSA processor with a high-radix Montgomery multiplier on an FPGA platform, and the different characteristics of power waveforms caused by two types of multiplier (built-in and custom) were investigated in detail. We also applied an active attack where input data was set to a specific pattern to control the modular multiplication. The power dissipation for the multiplication was greatly reduced in comparison with modular squaring, resulting in success in revealing all of the secret key bits.

Original languageEnglish
Article number4253021
Pages (from-to)1847-1850
Number of pages4
JournalProceedings - IEEE International Symposium on Circuits and Systems
DOIs
Publication statusPublished - 2007
Event2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007 - New Orleans, LA, United States
Duration: 2007 May 272007 May 30

Fingerprint

Dive into the research topics of 'SPA against an FPGA-B ased RSA implementation with a high-radix montgomery multiplier'. Together they form a unique fingerprint.

Cite this