{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:30:55Z","timestamp":1759638655166,"version":"3.40.5"},"reference-count":24,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2021,3,15]]},"abstract":"<jats:p> RSA-CRT is one of the most common algorithms in the digital signature. Several side-channel attacks have been presented on the implementation of RSA-CRT. One of the most important side-channel attacks on RSA-CRT is Modular Reduction on Equidistant Data (MRED). The implementation of RSA-CRT has too many challenges in the multiplications when the key size is too long (e.g. 2048 bits). Montgomery multiplication is one of the common methods for executing the RSA multiplication, which has many implementation problems and side-channel leakage challenges. This article first implements an RSA-CRT algorithm based on the Montgomery multiplication with the high-speed and low area hardware. The implementation is named RSA-CRT-MMB (Montgomery Method Based). Next, a new power analysis side-channel attack on RSA-CRT-MMB is presented. We name our attack MRED on MMB. The attack utilizes new side-channel leakage information about the CRT reduction algorithm implemented by the MMB, for the first time. The previous articles do not investigate the MRED attack on Montgomery multiplication in RSA-CRT. Finally, a new countermeasure is presented to prevent the MREDM attack. The countermeasure does not have any overload in the hardware area or running time of the RSA algorithm. The correctness of our scheme, the 2048-bit RSA-CRT-MMB, is investigated by the implementation of the scheme on the SASEBO-W board in our DPA laboratory. The total running time of 2048-bit RSA is 250[Formula: see text]ms and the RSA algorithm occupies only 23% of LUT slice on Spartan-6 FPGA. The proposed countermeasures are also verified by practical experiments. <\/jats:p>","DOI":"10.1142\/s0218126621500389","type":"journal-article","created":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T13:36:41Z","timestamp":1589981801000},"page":"2150038","source":"Crossref","is-referenced-by-count":6,"title":["A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based"],"prefix":"10.1142","volume":"30","author":[{"given":"S.","family":"Kaedi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Shahed University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9124-4083","authenticated-orcid":false,"given":"M. A.","family":"Doostari","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Shahed University, Tehran, Iran"}]},{"given":"M. B.","family":"Ghaznavi-Ghoushchi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Shahed University, Tehran, Iran"}]},{"given":"H.","family":"Yusefi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Shahed University, Tehran, Iran"}]}],"member":"219","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"S0218126621500389BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_4"},{"key":"S0218126621500389BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"S0218126621500389BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_14"},{"key":"S0218126621500389BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"S0218126621500389BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"S0218126621500389BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_8"},{"key":"S0218126621500389BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"S0218126621500389BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"S0218126621500389BIB009","first-page":"1","volume-title":"18th Int. Conf. on Digital Signal Processing (DSP)","author":"Kuzu E. A.","year":"2013"},{"key":"S0218126621500389BIB010","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.0109.0249"},{"key":"S0218126621500389BIB011","first-page":"138","volume-title":"IEEE 3rd Int. Advance Computing Conf. (IACC)","author":"Kuzu E. A.","year":"2013"},{"key":"S0218126621500389BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_2"},{"key":"S0218126621500389BIB013","first-page":"426","volume-title":"CHES 2008","author":"Oswald E.","year":"2008"},{"key":"S0218126621500389BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_9"},{"key":"S0218126621500389BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEC.2014.6978216"},{"key":"S0218126621500389BIB016","first-page":"228","volume-title":"Int. Workshop on Cryptographic Hardware and Embedded Systems \u2014 CHES 2002","author":"den Boer B.","year":"2002"},{"volume-title":"A DPA Attack on RSA in CRT Mode","year":"2009","author":"Witteman M.","key":"S0218126621500389BIB017"},{"key":"S0218126621500389BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_4"},{"key":"S0218126621500389BIB019","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"S0218126621500389BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.001"},{"key":"S0218126621500389BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095924"},{"key":"S0218126621500389BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_18"},{"key":"S0218126621500389BIB023","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618501918"},{"key":"S0218126621500389BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.003"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126621500389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T03:16:41Z","timestamp":1617160601000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126621500389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":24,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2021,3,15]]}},"alternative-id":["10.1142\/S0218126621500389"],"URL":"https:\/\/doi.org\/10.1142\/s0218126621500389","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2020,9,29]]}}}