Total views : 132

Partitioned-Exponent Blinding: A Countermeasure against Power Analysis Attacks


  • Department of CSE, Assam University, Silchar - 788011, Assam, India


Objectives: To resist power analysis attacks in modular exponentiation based cryptosystems like RSA. Methods/Analysis: A power analysis attack uses the instantaneous power consumed by a cryptosystems during its most sophisticated operations like encryption/decryption which uses the secret keys. Masking/blinding has proven its ability to resist such attacks by hiding the actual data during computation. As a result, analysis of the power consumption would reveal only the masked data keeping the actual secret data intact. Findings: Our proposed technique partitions the secret key into multiple parts and then blinds them individually before the cryptographic computations. With these blinded partitions, it would be very difficult for attackers to reveal the actual data as the power consumptions will be for blinded key not the actual key. Due to partitioning of the exponent there will be no uniformity in the power traces increasing resistance against power analysis attacks. Applications: All the cryptosystems have been found vulnerable to power analysis attacks, it resist modular exponentiation based cryptosystems like RSA from such attacks.


Cryptosystem, Masking, Modular Exponentiation, Power Analysis Attacks, RSA

Full Text:

 |  (PDF views: 114)


  • Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Annual International Cryptology Conference; USA: Springer Berlin Heidelberg. 1999. p. 388–97. Available from: Crossref
  • Sridhar KP, Saravanan S, Sai RV. Counter measure against side channel power analysis attacks in Cryptographic Devices.Indian Journal of Science and Technology. 2014Apr; 7(4):15–20.
  • Coron JS, Goubin L. On boolean and arithmetic masking against differential power analysis. Proceedings of International Workshop on Crytographic Hardware and Embedded Systems (CHES); USA: Springer Berlin Heidelberg.2000. p. 231–7. Available from: Crossref
  • Goubin L. A sound method for switching between boolean and arithmetic masking. Proceedings of International Workshop on Crytoghraphic Hardware and Embedded Systems (CHES); France: Springer Berlin Heidelberg. 2001.p. 3–15. Available from: Crossref
  • Coron J, Tchulkine A. A new algorithm for switching from arithmetic to Boolean masking. Proceedings of International Workshop on Crytoghraphic Hardware and Embedded Systems (CHES); Germany: Springer Berlin Heidelberg.2003. p. 89–97.
  • Standaert FX, Peeters E, Quisquater JJ. On the masking countermeasure and higher order power analysis attacks.Proceedings of IEEE International Conference on Information Technology: Coding and Computing; USA. 2005. p.562–5. Available from: Crossref
  • Mangard S, Popp T, Gammel BM. Side channel leakage of masked CMOS gates. Proceedings of Cryptographer’s Track at the RSA Conference; USA: Springer Berlin Heidelberg.2005. p. 351–65. Available from: Crossref
  • Gebotys CH. A split-mask countermeasure for low-energy secure embedded systems. ACM Transactions on Embedded Systems. 2006 Aug; 5(3):577–612. Available from: Crossref
  • Coron JS, Kizhvatov I. Analysis of split mask countermeasure for embedded systems. Proceedings of 4th Workshop on Embedded Systems Security; France. 2009. p. 3–12.Available from: Crossref
  • Jin JF, Lu EH. Resistance of DPA on RSA smartcard. Proceedings IEEE 5th International Conference on Information Assurance and Security; China. 2009. p. 406–9.Available from: Crossref
  • Prouff E, Rivain M. Masking against side channel attacks: A formal security proof. Proceedings Annual International Conference on the Theory and Applications of Cryptographic Techniques; Greece: Springer Berlin Heidelberg.2013. p. 142–59. Available from: Crossref
  • Mangard S, Oswald E, Popp T. Power analysis attacks: Revealing the secrets of smart cards. Springer Science and Business Media. 2008; 31:163–285.
  • Kim H, Han DG, Hong S, Ha J. Message blinding method requiring no multiplicative inversion for RSA. ACM Transaction on Embedded Computing Systems. 2014 Nov; 13(4):80–9. Available from: Crossref
  • Balasch J, Faust S, Gierlichs B. Inner product masking revisited.Proceedings Annual International Conference on the Theory and Applications of Cryptographic Techniques; Bulgaria: Springer Berlin Heidelberg. 2015. p. 486–510.Available from: Crossref
  • Schindler W. Exclusive exponent blinding is not enough to prevent any timing attack on RSA. Journal of Cryptographic Engineering. 2016 Nov; 6(2):101–19. Available from: Crossref


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.