Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
ARM Cortex-M3 »ó¿¡¼ °ö¼À ¿¬»ê ÃÖÀûÈ ±¸Çö |
¿µ¹®Á¦¸ñ(English Title) |
Compact Implementation of Multiplication on ARM Cortex-M3 Processors |
ÀúÀÚ(Author) |
¼ÈÁ¤
Hwa-jeong Seo
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 22 NO. 09 PP. 1257 ~ 1263 (2018. 09) |
Çѱ۳»¿ë (Korean Abstract) |
°æ·® »ç¹°ÀÎÅÍ³Ý µð¹ÙÀ̽º »ó¿¡¼ÀÇ ¾ÏÈ£È ±¸ÇöÀº Á¤È®ÇÏ°í ºü¸£°Ô ¿¬»êÀ» ¼öÇàÇÏ¿© ¼ºñ½ºÀÇ °¡¿ë¼ºÀ» ³ôÀÌ´Â °ÍÀÌ Áß¿äÇÏ´Ù. ƯÈ÷ °ö¼À ¿¬»êÀº RSA, ECC, ±×¸®°í SIDH¿Í °°Àº °ø°³Å° ¾Ïȣȿ¡ È°¿ëµÇ´Â ÇÙ½É ¿¬»êÀ¸·Î ÃÖÀûÈµÈ ±¸ÇöÀÌ ¿ä±¸µÈ´Ù. ÇÏÁö¸¸ ÃֽŠÀúÀü·Â ÇÁ·Î¼¼¼ÀÎ ARM Cortex-M3 ÇÁ·Î¼¼¼ÀÇ °æ¿ì¿¡´Â °ö¼À¿¬»ê ÀÔ·Â Å©±â¿¡ µû¶ó ¼öÇà¼Óµµ°¡ ´Þ¶óÁö´Â º¸¾È Ãë¾àÁ¡À» °¡Áö°í ÀÖ´Ù. ¼öÇà¼Óµµ°¡ ´Þ¶óÁö°Ô µÉ °æ¿ì ¿¬»ê ½Ã°£ÀÇ Â÷ÀÌÁ¡À» È®ÀÎÇÏ¿© ºñ¹ÐÁ¤º¸¸¦ ÃßÃâÇÏ´Â °ÍÀÌ °¡´ÉÇÏ´Ù. À̸¦ º¸¿ÏÇϱâ À§ÇØ ÃÖ±Ù ¿¬±¸¿¡¼´Â °íÁ¤µÈ ¿¬»ê ½Ã°£ ¾È¿¡ °ö¼À ¿¬»êÀ» ¼öÇàÇÏ´Â ±â¹ýÀÌ Á¦¾ÈµÇ¾ú´Ù. ÇÏÁö¸¸ ÇØ´ç ±¸Çö¿¡¼´Â ¿©ÀüÈ÷ ¼Óµµ°¡ ¿ÏÀüÈ÷ ÃÖÀûȵǾî ÀÖÁö ¾Ê´Ù. º» ³í¹®¿¡¼´Â ±âÁ¸¿¡ Á¦¾ÈµÈ °ö¼À¿¬»êÀ» º¸´Ù È¿À²ÀûÀ¸·Î ¿¬»êÇϱâ À§ÇÑ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ ±â¹ýÀº ±âÁ¸ ¹æ½Ä¿¡ ºñÇØ ¿¬»ê ¼Óµµ¸¦ ÃÖ´ë 25.7% Çâ»ó½ÃŲ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Secure authentication technology is a fundamental building block for secure services for Internet of Things devices. Particularly, the multiplication operation is a core operation of public key cryptography, such as RSA, ECC, and SIDH. However, modern low-power processor, namely ARM Cortex-M3 processor, is not secure enough for practical usages, since it executes the multiplication operation in variable-time depending on the input length. When the execution is performed in variable-time, the attacker can extract the password from the measured timing. In order to resolve this issue, recent work presented constant-time solution for multiplication operation. However, the implementation still missed various speed-optimization techniques. In this paper, we analyze previous multiplication methods over ARM Cortex-M3 and provide optimized implementations to accelerate the speed-performance further. The proposed method successfully accelerates the execution-time by up-to 25.7% than previous works.
|
Å°¿öµå(Keyword) |
ARM Cortex-M3
ºÎä³Î °ø°Ý
¼ÒÇÁÆ®¿þ¾î ±¸Çö
°ö¼À
ARM Cortex-M3
Side Channel Attack
Software Implementation
Multiplication
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|