-
Notifications
You must be signed in to change notification settings - Fork 3
/
HessenNygaardAbstract.tex
39 lines (30 loc) · 1.55 KB
/
HessenNygaardAbstract.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
\documentclass{article}
\usepackage[utf8]{inputenc}
%-----------------------
\begin{document}
\title{Montgomery Ladder Exponentiation as a countermeasure against RSA timing attacks \\
\large{CS290G Project Proposal}}
\author{
Hessen, Hans-Olav\\
\texttt{[email protected]}
\and
Nygård, Arve\\
\texttt{[email protected]}
}
\maketitle
\begin{abstract}
\noindent For our project we want to implement the RSA algorithm on the UDOO board.\\
\\
RSA relies on modular exponentiation. There are several ways to do this. A commonly used technique for doing the exponentiation is called Montgomery exponentiation. However, this technique is vulnerable to timing attacks. We will implement RSA using both the standard Montgomery exponentiation and an alternative technique called Montgomery powering ladder, and show that the latter is resistant to timing attacks.
\\
Finally we will compare the execution time of each implementation, and assess how suitable the Montgomery ladder implementation is for practical use on a low-end device such as the UDOO.\\
\\
We will analyze the trade-off between added security and performance, and conclude what implementation is applicable for this device.\\
\\
The biggest challenge for this project will be the short time frame and our limited experience using the UDOO.
\end{abstract}
\section {Introduction (placeholder)}
Short introduction about RSA, and the two exponentiation methods, as well as the UDO board.
\section{Algorithm walkthrough (placeholder)}
RSA, Montgomery ladder, Montgomery exponentiation pseudo code
\end{document}