期刊名称:Visnyk NTUU KPI : Informatics, Operation and Computer Science
印刷版ISSN:0135-1729
出版年度:2007
卷号:47
出版社:National Technical University of Ukraine
摘要:The goal of presented by article research is to point out the potential vulnerabilities of modular exponentiation operands reconstruction by power dynamic analysis and to elaborate countermeasures. It has been shown that exponent of modular exponentiation which is secret key of RSA, El-Gamal and DSA can be reconstruction by timing power analysis. For countermeasure the special algorithm for modular exponenttiation has been worked out. Proposed algorithm does not conditional operators use and include the false operators which inhibit to timing power analysis. It has been shown that implementation of proposed approach demand about 25% more time for modular exponentiation.