Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Title | Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Noma, Adamu Muhammad, Muhammad, Abdullah |
Conference Name | 2019 International Conference on Information Networking (ICOIN) |
Date Published | jan |
Keywords | ACP, addition chain problem, Benchmark testing, dummy operations, exponentiation, exponentiation operation, Heuristic algorithms, Microsoft Windows, modular exponentiation, multiplication-squaring operations, PKC, pubcrawl, public key cryptography, public-key cryptography, public-key cryptosystem, Resiliency, RSA, RSA cryptosystem, SCA, Scalability, security effectiveness, Side-channel attack, stochastic heuristic approach, stochastic method, Stochastic processes |
Abstract | This paper shows that stochastic heuristic approach for implicitly solving addition chain problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and improves the security by blinding the multiplications/squaring operations involved against side-channel attack (SCA). We show that while the current practical heuristic approaches being deterministic expose the fixed pattern of the operations, using stochastic method blinds the pattern by being unpredictable and generating diffident pattern of operation for the same exponent at a different time. Thus, if the addition chain (AC) is generated implicitly every time the exponentiation operation is being made, needless for such approaches as padding by insertion of dummy operations and the operation is still totally secured against the SCA. Furthermore, we also show that the stochastic approaches, when carefully designed, further reduces the length of the operation than state-of-the-art practical methods for improving the efficiency. We demonstrated our investigation by implementing RSA cryptosystem using the stochastic approach and the results benchmarked with the existing current methods. |
DOI | 10.1109/ICOIN.2019.8718161 |
Citation Key | noma_stochastic_2019 |
- public key cryptography
- Stochastic processes
- stochastic method
- stochastic heuristic approach
- Side-channel attack
- security effectiveness
- Scalability
- SCA
- RSA cryptosystem
- RSA
- Resiliency
- public-key cryptosystem
- public-key cryptography
- ACP
- pubcrawl
- PKC
- multiplication-squaring operations
- modular exponentiation
- microsoft windows
- Heuristic algorithms
- exponentiation operation
- exponentiation
- dummy operations
- Benchmark testing
- addition chain problem