SlideShare a Scribd company logo
1 of 1
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
   Homomorphic Property-Based Concurrent Error Detection of RSA:
                A Countermeasure to Fault Attack
   Abstract
          Fault-based attacks, which recover secret keys by deliberately introducing fault(s)
   in cipher implementations and analyzing the faulty outputs, have been proved to be
   extremely powerful. In this paper, we propose a novel Concurrent Error Detection (CED)
   scheme to counter fault-based attack against RSA by exploiting its multiplicative
   homomorphic property. Specifically, the proposed CED scheme verifies if Πi=1k E(mi) ≡
   EΠi=1k mi (mod n) (mod n) where E could be either RSA encryption, or decryption, or
   signature, or verification process. Upon a mismatch, all the ciphertexts will be
   suppressed. The time overhead is 1/k and k can be used to trade-off the time overhead
   with memory overhead and output latency. Recognizing that an RSA device could be
   subject to a combination of several side-channel attacks, the proposed scheme enables an
   easy divide-and-concur solution-any fine-tuned architecture, for example, a power-attack-
   resistant architecture can be equipped with fault-attack resistance easily without
   disturbing its original resistance. This advantage distinguishes the proposed scheme over
   the existing countermeasures.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                           1

More Related Content

Similar to Homomorphic CED Scheme Counters Fault Attacks on RSA

Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...Ecwaytech
 
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...OKOKPROJECTS
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...IDES Editor
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingecwayprojects
 
Dotnet min-max a counter-based algorithm for regular expression matching
Dotnet  min-max a counter-based algorithm for regular expression matchingDotnet  min-max a counter-based algorithm for regular expression matching
Dotnet min-max a counter-based algorithm for regular expression matchingEcwaytech
 
Java min-max a counter-based algorithm for regular expression matching
Java  min-max a counter-based algorithm for regular expression matchingJava  min-max a counter-based algorithm for regular expression matching
Java min-max a counter-based algorithm for regular expression matchingecwayerode
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingecway
 
54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-projectveenanandkakarla
 
Compact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsCompact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsNexgen Technology
 
Compact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsCompact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsNexgen Technology
 
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of OperationKey Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of Operation1crore projects
 
Secure computing for java and dot net
Secure computing for java and dot netSecure computing for java and dot net
Secure computing for java and dot netredpel dot com
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEEMEMTECHSTUDENTPROJECTS
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable EncryptionNagendra Posani
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field AJAL A J
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 

Similar to Homomorphic CED Scheme Counters Fault Attacks on RSA (20)

9
99
9
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
DefQ Defensive Quantization Against Inference Slow-Down Attack for Edge Compu...
 
46
4646
46
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
Dotnet min-max a counter-based algorithm for regular expression matching
Dotnet  min-max a counter-based algorithm for regular expression matchingDotnet  min-max a counter-based algorithm for regular expression matching
Dotnet min-max a counter-based algorithm for regular expression matching
 
Java min-max a counter-based algorithm for regular expression matching
Java  min-max a counter-based algorithm for regular expression matchingJava  min-max a counter-based algorithm for regular expression matching
Java min-max a counter-based algorithm for regular expression matching
 
Min max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matchingMin max a counter-based algorithm for regular expression matching
Min max a counter-based algorithm for regular expression matching
 
54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project
 
Compact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsCompact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutions
 
Compact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutionsCompact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutions
 
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of OperationKey Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
 
Secure computing for java and dot net
Secure computing for java and dot netSecure computing for java and dot net
Secure computing for java and dot net
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
Analysis of Searchable Encryption
Analysis of Searchable EncryptionAnalysis of Searchable Encryption
Analysis of Searchable Encryption
 
PraveenKH_Resume
PraveenKH_ResumePraveenKH_Resume
PraveenKH_Resume
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
52
5252
52
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 

More from Impulse_Technology1 (20)

11
1111
11
 
10
1010
10
 
8
88
8
 
7
77
7
 
6
66
6
 
4
44
4
 
1
11
1
 
30
3030
30
 
29
2929
29
 
28
2828
28
 
27
2727
27
 
9
99
9
 
8
88
8
 
7
77
7
 
6
66
6
 
5
55
5
 
4
44
4
 
3
33
3
 
2
22
2
 
1
11
1
 

Homomorphic CED Scheme Counters Fault Attacks on RSA

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack Abstract Fault-based attacks, which recover secret keys by deliberately introducing fault(s) in cipher implementations and analyzing the faulty outputs, have been proved to be extremely powerful. In this paper, we propose a novel Concurrent Error Detection (CED) scheme to counter fault-based attack against RSA by exploiting its multiplicative homomorphic property. Specifically, the proposed CED scheme verifies if Πi=1k E(mi) ≡ EΠi=1k mi (mod n) (mod n) where E could be either RSA encryption, or decryption, or signature, or verification process. Upon a mismatch, all the ciphertexts will be suppressed. The time overhead is 1/k and k can be used to trade-off the time overhead with memory overhead and output latency. Recognizing that an RSA device could be subject to a combination of several side-channel attacks, the proposed scheme enables an easy divide-and-concur solution-any fine-tuned architecture, for example, a power-attack- resistant architecture can be equipped with fault-attack resistance easily without disturbing its original resistance. This advantage distinguishes the proposed scheme over the existing countermeasures. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1