期刊文献+

平稳与平衡——椭圆曲线密码体制抗旁信道攻击的策略与手段 被引量:4

Stationarity and Balance—Strategies and Methods of Elliptic Curve Cryptosystem Against Side Channel Attacks
下载PDF
导出
摘要 旁信道攻击方法(sidechannelattack)通过对密码系统的一些特殊信息的获取来进行分析与攻击·对于椭圆曲线密码体制,最主要的就是要使标量乘能够抵抗旁信道攻击方式,密码学界的研究者在这方面做了很多具体且细致的工作,从各个不同的角度提出了很多新的算法与方案·综述了椭圆曲线密码体制上抗旁信道攻击的进展情况,以“平稳”与“平衡”作为两条线索,讨论了椭圆曲线密码系统上抗旁信道攻击的各种策略和方案,指出了它们各自的优劣以及适用范围,并在最后探讨了该领域未来研究和发展方向· Side channel attacks are a recent class of attacks, which use observations such as timings or power consumption measurements in order to obtain information that is supposed to be kept secret and revealed to be very powerful in practice. In elliptic curve cryptosystems, a particular target for side channel attacks is algorithms used for point multiplication. For speeding up elliptic curve scalar multiplication and making it secure against side channel attacks, various methods are proposed using specially chosen elliptic curves, the special presentations of points on the curve, and other techniques. The surveys of the achievements of algorithms and implementations of elliptic curve cryptosystem to defense against side channel attacks based on the two main views of stationarity and balance are presented. The advantage and disadvantage of each method are also pointed out here. Finally, several main directions of future research on this topic are pointed out as well.
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第10期1667-1672,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90304014)
关键词 椭圆曲线 密码学 旁信道攻击 elliptic curve cryptosystem side channel attack
  • 相关文献

参考文献48

  • 1N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 1987, 48(177): 203~ 209.
  • 2V. Miller. Uses of elliptic curve in cryptography. In: Proc.CRYPTO' 85, Lecture Notes in Computer Science 218. New York: Springer Verlag, 1986. 417~426.
  • 3IEEE P1363/D9 Standard specifications for public-key cryptography. New York, USA: Institute of Electrical and Electronics Enginees, Inc. , 2001.
  • 4Recommended elliptic curves for federal government use. National Institute for Standard and Technology, 1999.
  • 5H. Silverman. The Arithmetic of Elliptic Curves, GTM106. New York: Springer-Verlag, 1986.
  • 6Henri Cohen, Atsuko Miyaji, Takatoshi Ono. Efficient elliptic curve exponentiation using mixed coordinates. In: Proc.ASIACRYPT98. New York: Springer-Verlag, 1999. 51 ~ 65.
  • 7C.H. Lim, H. S. Hwang. Fast implementation of elliptic curve arithmetic in GF(pm). In: Proc. PKC'00. New York: SpringerVerlag, 2001. 405~421.
  • 8Alfred Mezenzes. Elliptic Curve Public Key Cryptosystems.Boston: Kluwer Academic Publishers, 1993.
  • 9I. Blake, G. Seroussi, N. Smart. Elliptic Curves in Cryptography. In: London Math. Soc. Lecture Note Ser. 25.New York: Cambridge University Press, 1999.
  • 10A.J. Menezes, T. Okamoto, S. A. Vanstone. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1997.

同被引文献20

  • 1陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
  • 2韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 3Neal Koblitz.The state of elliptic curve cryptogra-phy.Designs Codes and Cryptography,2000,19:173-193
  • 4Bodo MSller.Securing elliptic curve point muhipli-cation against side-channel attacks.Information Se-curity-ISC2001,Lecture Notes in Computer Sci-ence,2200.Springer,2001:324-334
  • 5Izu T,Takagi T.A fast parallel elliptic curve multi-plication resistant against side channel attacks.Pub-lie Key Cryptography,5th International Workshop on Practice and Theory in Public Key Cryptosys-tems,Lecture Notes in Computer Science,Springer,2002·2274:280-296
  • 6Oswald E,Aigner M.Randomized addition-subtrac-tion chains as a countermeasure against power at-tacks.Cryptographic Hardware and Embedded Sys-terns-CHES 2001,3th International Workshop,Paris,France,May 14-16,2001,Proceedings,Lec-ture Notes in Computer Science(LNCS),Springer,2001,2162:39.50
  • 7张家宏,陈建华,张丽娜.并行结构的椭圆曲线密码算法实现[J].计算机工程与设计,2007,28(23):5598-5600. 被引量:4
  • 8Katsuyuki Okeya,Tsuyoshi Takagi.The width-w NAF method provides small memory and fast Elliptic Scalar multiplications secure against side channel attacks. CT-RSA2003 . 2003
  • 9Chae Hoon Lim.A new method for securing elliptic scalar mul-tiplication against side-channel attacks. ACISP 2004 . 2004
  • 10徐秋亮,李大兴.椭圆曲线密码体制[J].计算机研究与发展,1999,36(11):1281-1288. 被引量:66

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部