期刊文献+

RSA密码算法的功耗轨迹分析及其防御措施 被引量:19

Power Trace Analysis Attack and Countermeasures for RSA Cryptographic Circuits
下载PDF
导出
摘要 针对RSA密码算法的电路,提出了一种新的功耗分析攻击方法———功耗轨迹分析.该方法的基本特点是通过处理电路的功率信号,从信号的轨迹图形中获取RSA算法的敏感信息(如密钥),因此,功耗轨迹分析能够有效地攻击现有的多种形式的RSA实现方案.同时还探讨了RSA密码电路防御攻击的措施:直接在算法中添加冗余的伪操作能够抵御功耗轨迹分析攻击,但是这会导致电路功耗增大和速度降低.进而还提出了一种将RSA算法中的伪操作随机化的新方法.该方法能够在保证电路安全性的同时又节省电路功耗和运算时间. The first purpose of this paper is to present a new power analysis attack, total power trace analysis, which is a considerable menace to the unprotected RSA chip. And this attack can efficiently extract secret information from the patterns of the processed power signals. Several different version exponentiation algorithms of RSA cipher examined in the authors' research are all vulnerable to this type attack. The second purpose of this paper is to investigate the countermeasures against the power analysis attack mentioned above. The investigation done in this paper indicates that adding dummy operations into the cipher circuits can resist the attack, but result in higher power consumption and slower speed. And a new solution named as randomized dummy operations is proposed, which can also keep the security of the chip but with a lower power consumption level and faster speed.
出处 《计算机学报》 EI CSCD 北大核心 2006年第4期590-596,共7页 Chinese Journal of Computers
基金 国家自然科学基金(90407002 60576024)资助
关键词 功耗分析攻击 RSA密码算法 安全芯片 抗攻击 模幂 power analysis attack RSA cryptographic algorithm security chip anti-attack exponentiation
  • 相关文献

参考文献6

  • 1Kocher P,Jaffe J,Jun B..Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO' 99),Santa Barbara,USA,1999,388~397
  • 2Rivest R.L,Shamir A,Adleman L..A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM,1978,21(2):120~126
  • 3Messerges T.S,Dabbish E.A,Sloan R.H..Power analysis attacks of modular exponentiation in smartcards.In:Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'99),Worcester,USA,1999,144~157
  • 4Brickel E.F..A survey of hardware implementations of RSA.In:Proceedings of the Advances in Cryptology (CRYPTO'89),Santa Barbara,USA,1990,368~370
  • 5Montgomery P.L..Modular multiplication without trial division.Mathematics of Computation,1985,44(170):519~521
  • 6Messerges T.S..Power analysis attacks and countermeasures for cryptographic algorithms[Ph.D.dissertation].Graduate College of the University of Illinois at Chicago,2000

同被引文献231

引证文献19

二级引证文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部