期刊文献+

一种抗简单功耗分析攻击的模幂算法 被引量:2

A Countermeasure to Simple Power Analysis for Modular Exponentiation
下载PDF
导出
摘要 在真实环境下对智能卡RSA算法进行了功耗采集,通过简单功耗分析攻击(SPA)提取出了密钥,证明了传统的模幂运算二元表示(Binary Representation,BR)算法存在明显的密钥信息泄露缺陷。分析发现,信息泄露发生在程序的跳转分支处。针对这一缺陷,提出了一种原子化操作与引入随机数相结合的模幂算法。通过操作的原子化统一了模幂算法的执行路径,消除因跳转分支引起的信息泄露;引入随机数对密钥的汉明重量进行掩盖,有效地防止密钥信息的泄露。在MC8051上的实测验证表明,新算法确实具有抗简单功耗分析的特性。 The effect power of the running Smart card with RSA algorithm was collected to extract the Key by Simple Power Analysis Attaching(SPA).That shows there existing obvious information leak defect of the traditional modular exponentiation Binary Representation.Information leak happened to the program branches from our research.A novel algorithm combining atomic operation with random number was presented to avoid prescribed problem.The operate path of modular exponentiation was unify and the Hamming Weight of the key was masked using random number with this algorithm so as not to exposure to the adventure of information leak.Experiments were done in MC8051.The results show that the algorithm is well resistance to SPA.
出处 《成都信息工程学院学报》 2011年第2期123-126,共4页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 四川省科技支撑计划重点项目(2011GZ0170)
关键词 信息安全 边信道攻防 简单功耗分析 原子化操作 随机数 information security side-channel attack and defense SPA atomic operation random number
  • 相关文献

参考文献4

二级参考文献16

  • 1韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 2Kocher P. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[C]//Proceedings of CRYPTO'96. Santa Barbara, CA, USA: Springer-verlag, 1996:104-113.
  • 3KOCHER E Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Proceedings of Advances in Cryptology-CRYPTO'96[C]. 1996. 104-113.
  • 4DHEM J F, KOEUME F, LEROUX P A, et al. A practical implementation of the timing attack[A]. Proceedings of CARDIS 1998[C]. 1998.14-16.
  • 5MESSERGES T S, DABBISH E A, SLOAN R H. Investigations of power analysis attacks on smart cards[A]. Proc USENIX Workshop Smartcard Technology[C]. Chicago, Illinois ,USA, 1999. 151-161.
  • 6KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Proceedings of Advances in Cryptology[C]. 1999.388-397.
  • 7ITOH K, IZU T, TAKENAKA M. Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA[A]. CHES 2002[C]. 2003. 129-143.
  • 8ITOH K, IZU T, TAKENAKA M. A Practical Countermeasure against address-bit differential power analysis C D[A]. CHES 2003[C]. 2003.382-396.
  • 9CORSONELLO P. An Integrated Countermeasure against Differential Power Analysis for Secure Smart-Cards[M]. The Circuit is Under Patenting. US Provisional Patent Application 60/643, 165.
  • 10RATANPAL G B, WILLIAMS R D, BLALOCK T N. An on-chip signal suppression countermeasure to power analysis attacks[J]. IEEE Transac tions on Dependable and Secure Computing, 2004, 1(3): 179.

共引文献19

同被引文献25

  • 1孙敦灿,陈运,万武南,索望.功耗分析平台中混合编程的应用研究[J].成都信息工程学院学报,2011,26(2):127-131. 被引量:3
  • 2韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 3KOCHER P.Timing attacks On implementations of diffe-hellman,RSA,DES,and other system[A].Proceed-ings of Advances in Cryptology-CRYPTO’96[C],1996:104-113.
  • 4DHEM J F.KOEUME F,LEROUX P A,et al.A practical implementation of the timing attack[A].Proceed-ings of CARDIS 1998[C].1998:14-16.
  • 5MESSERGES T S,DABBISH E A,SLOAN R H.Investigations of power analysis attacks on smarteards[A].Proc USENIX Workshop Smarteard Technology[C].Chicago,Illinois,USA,1999:151-161.
  • 6KOCHER P,JAFFE J,JUN B.Differential power analysis[A].Proceedings of Advances in Cryptology-CRYPTO’99[C].1999:388-397.
  • 7Suresh Chari,Josyula R.Rao,and Pankaj Rohatgi.Template Attacks[A].CHES 2002,LNCS 2523,2003:13-28.
  • 8C.Archambeau,E.Peters et al.Template Attacks in Principal Subspaces[A].CHES 2006,LNCS 4249,2006:1-14.
  • 9Francois-Xavier Standaert et al.and Cedric Archambeau.Using Subspace-Based Template Attacks to Com-pare and Combine Power and Electromagnetic Information Leakages[A].CHES 2008,LNCS 5154,2008:411-425.
  • 10O Acicmez,J P Seifert,C K Koc.Predicting secret keys via branch prediction[J].Topics in Cryptology-CT-RSA 2007.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部