In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery Modular Multiplication. The Montgomery modular multiplier has been realized with Carry-Save Adders. Carry-Save representation has been used throughout the RSA encryption algorithm. The primarily implemented RSA architecture prevents the extraction of the secret key using Simple Power Analysis attacks. When comparing the protected implementation with the unprotected, it can be seen that the total time has increased by 24.2%, while the throughput has decreased by 19.5%.
RSA, montgomery modular multiplier, carry save adder, side-channel attacks, differential power analysis attack, randomized table window method.
BAYAM, KEKLİK ALPTEKİN and ÖRS, BERNA
"Differential power analysis resistant hardware implementation of the RSA cryptosystem,"
Turkish Journal of Electrical Engineering and Computer Sciences: Vol. 18:
1, Article 10.
Available at: https://journals.tubitak.gov.tr/elektrik/vol18/iss1/10