skip to main content
10.1145/508791.508837acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Implementation of fast RSA key generation on smart cards

Published:11 March 2002Publication History

ABSTRACT

Although smart cards are becoming used in an increasing number of applications, there is small literature of the implementation issues for smart cards. This paper describes the issues and considerations that need to be taken into account when implementing the key generation step of a cryptographic algorithm widely used nowadays, RSA.Smart cards are used in many applications that require a tamper resistant area. Therefore, smart cards that use cryptography have to provide encryption, decryption, as well as key generation inside its security perimeter. RSA key generation is a concern for on-card implementation of RSA cryptosystem, as it usually takes a long time. In this paper, two simple but efficient key generation algorithms are evaluated, in addition to a simple but not very efficient algorithm. The paper discusses in detail how to build fast implementations for the three algorithms presented, using smart cards with crypto-coprocessor.

References

  1. Blackburn, S., Black-Wilson, S., and Burmester, M. Shared Generation of Shared RSA Keys. Technical Report CORR 98-19, Dept. of C&O, Univ. of Waterloo, Canada, 1998.]]Google ScholarGoogle Scholar
  2. Bosma, W. Primality Proving with Cyclotomy. Doctoral Dissertation, University of Amsterdam, 1990.]]Google ScholarGoogle Scholar
  3. Bressoud, D. M. Factorizations and Primality Testing. Springer-Verlag, New York, 1989.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. Chan, S. C. An Overview of Smart card Security, http://www.hkstar.com/~alanchan/papers/smartCardSecurity/.]]Google ScholarGoogle Scholar
  5. Dhem, J. F. Design of an Efficient Public-key Cryptographic Library for RISC-based Smart Cards. Universit Catholique de Louvain - Facultdes Sciences Appliqus - Laboratoire de microectronique, Louvain-la-Neuve, 1998.]]Google ScholarGoogle Scholar
  6. Diffie, W., and Hellman, M. Multiuser Cryptographic Techniques. Proceedings of AFIPS National Computer Conference, 1976, 109-112.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Diffie W., and Hellman, M. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22n. 6, Nov. 1976, 644-654.]]Google ScholarGoogle Scholar
  8. Handchuh, H., and Paillier, P. Smart Card Crypto-coprocessors for Public-Key Cryptography. Crypto Bytes, RSA Laboratories, 4 (summer 1999), 6-10.]]Google ScholarGoogle Scholar
  9. Johnson, D., and Menezes, A. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, Dept. of C&O, Univ. of Waterloo, Canada, 1999.]]Google ScholarGoogle Scholar
  10. Joye, M., Palliar, P., and Vandeney, S. Efficient Generation of Prime Numbers. CHES 2000, 340-354.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kaliski, B., and Robshaw, M. The Secure Use of RSA. CryptoBytes, RSA Laboratories, (Autumn 1995), 7-13.]]Google ScholarGoogle Scholar
  12. Knuth, D. E. The Art of Computer Programming. Semi numerical Algorithms of Computer Science and Information Processing, Addison-Wesley, 3rd ed., Vol. 2, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Koç, Ç. K. High-Speed RSA Implementation. Technical Report TR-201, version 2.0, RSA Laboratories, November 1994.]]Google ScholarGoogle Scholar
  14. Malkin, M., Wu, T., and Baneh, D. Experimenting with Shared Generation of RSA Keys. SNDSS'99, 1999, 43-56.]]Google ScholarGoogle Scholar
  15. Meneze, A. Comparing the Security of ECC and RSA. http://cacr.math.uwaterloo.ca/~ajmeneze/misc/cryptogram-article.html.]]Google ScholarGoogle Scholar
  16. Morain, E. Implementation of the Goldwasser-Killian-Atkin Primility Testing Algorithm. Mathematics Computation, Vol. 54, 1990, 839-854.]]Google ScholarGoogle Scholar
  17. NIST, US Department of Commerce, Digital Signature Standard, FIPS PUB 186, May 1994.]]Google ScholarGoogle Scholar
  18. Peyret, P. Which Smart Card Technology Will You Need to Ride the Information Highway Safely? Head of Research & Development, Gemplus Corporation, 1995.]]Google ScholarGoogle Scholar
  19. Rivest, R., Shamit, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM, Vol. 21, No. 2, Feb. 1978, 158-164.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Rivest, R. L. Finding Four Million Random Primes. Advances in Cryptology, Crypto '90, Springer-Verlag, 1991. 625-626.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rivest, R. L. Response to NIST's proposal. Communications of ACM, 35, 1992, 41-47.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Silverman, R. D. Fast Generation of Random, Strong RSA Primes: Crypto Bytes, RSA Laboratories, 3 (spring 1997), 9-13.]]Google ScholarGoogle Scholar
  23. Schumberger Limited. Advantages, Smart Cards: Inherent Advantages. http://www.slb.com/et/inherent_advantage.html.]]Google ScholarGoogle Scholar
  24. Stallings, W. Cryptography and Network Security: principle and practice, 2nd ed., Prentice-Hall, New Jersey, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. University of Texas at Austin. Enabling Smart Commerce in the Digital Age. http://cism.bus.utexas.edu/works/articles/smartcardswp.html.]]Google ScholarGoogle Scholar
  26. Wiener, M. Performance Comparision of Public-Key Cryptosystems. Crypto Bytes, RSA Laboratories, 4 (summer 1999), 1-5.]]Google ScholarGoogle Scholar

Index Terms

  1. Implementation of fast RSA key generation on smart cards

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
          March 2002
          1200 pages
          ISBN:1581134452
          DOI:10.1145/508791

          Copyright © 2002 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 March 2002

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader