期刊文献+

计时攻击及其防范 被引量:5

Timing Attack and Its Defense
原文传递
导出
摘要 计时攻击是指攻击者通过分析执行加密算法所需要的时间,从而获取密钥信息的攻击方式。文中对计时攻击的概念、原理以及历史进行了介绍,使读者能对计时攻击有基本了解。并以模幂运算为例,详细分析了计时攻击过程,以及几种计时攻击防范措施及其效果。虽然当前的防范措施能有效防范简单的计时攻击,但对于新的计时攻击方式的防范效果仍待研究。 Timing attack is a form of attack the time taken to execute cryptographic algorithms where the attacker tries to break a cryptosystem by analyzing This paper describes the basic concept, principles, and history of timing attack, the readers can thus have a basic understanding of this area. Then taking the modular exponentiation encryption algorithm as an example, it analyzes in detail the timing attack process, including the effectiveness of several timing attack preventive methods. Although the current preventive method can effectively resist the simple timing attack, the preventive effectiveness against the new attack methods remains to be studied.
作者 杨玺
出处 《通信技术》 2008年第7期185-188,共4页 Communications Technology
关键词 计时攻击 密码分析学 模幂运算 防范 盲化 timing attack cryptanalysis modular exponentiations protection blind
  • 相关文献

参考文献14

  • 1Aciicmez O, Schindler W, Koc C K. Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations[C]. 12th ACM conference on Computer and communications security, Alexandria, USA, 2005. New York: ACM, 2005: 139-146.
  • 2Brumley D, Boneh D. Remote Timing Attacks are PracticalIC]. 12th USENIX Security Symposium, Washington, USA, 2003. Berkeley: USENIX Association Press, 2003: 1-14.
  • 3Chaum D. Blind signatures for untraceable payments[C]. Crypto 1982, Santa Barbara, USA, 1982; New York: Plenum Press, 1983: 199-203.
  • 4Ferguson N, Schneier B. Practical Cryptography[M]. 1st edition, New York: John Wiley & Sons, 2003.
  • 5Handschuh H, Heys H. A timing attack on RC5[C]. 5th Annual Workshop on Selected Areas in Cryptography, Kingston, Canada, 1998; Berlin: Springer, 1999: 306-318.
  • 6Kelsey J, Schneier B, Wagner D, et al. Side Channel Cryptanalysis of Product Ciphers[C]. 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium; Berlin: Springer 1998: 97-110.
  • 7Koc C K. Analysis of Sliding Window Techniques for Exponentiation[J]. Computers and Mathematics with Applications, 1995, 30(10): 17-24.
  • 8Kocher P C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[C]. 16th Annual International Cryptology Conference, Santa Barbara, USA, 1996: Berlin: Springer, 1996:104-113.
  • 9Page D. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel[R]. Bristol: Department of Computer Science, University of Bristol, 2002.
  • 10Schindler W. A Timing Attack against RSA with the Chinese Remainder Theorem[C]. 2nd International Workshop Cryptographic Hardware and Embedded Systems, Worcester, USA, 2000. Berlin: Springer, 2000: 109-124.

二级参考文献12

  • 1殷新春,张宝华.公钥密码中大数模幂的并行窗口算法[J].计算机工程与应用,2004,40(18):50-53. 被引量:4
  • 2Paul C Kocher.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems.Advances in Cryptology,1996:104~113
  • 3David Brumley,Dan Boneh.Remote Timing Attacks are Practical,http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf,2003
  • 4Dan Boneh.Twenty Years of Attacks on the RSA Cryptosystem[J].Notices of the AMS,1999,64(2):203~213
  • 5D Coppersmith.Small solutions to polynomial equations,and low exponent RSA vulnerabilities[J].Journal of Cryptology,1997,10:233~260
  • 6RSA Press Release.http://www.otn.net/onthenet/rsaqa.htm,1995
  • 7C K Koc.Analysis of Sliding Window Techniques for Exponentiation[J].Computers and Mathematics with Applications,1995,30(10):17~24
  • 8Kocher P C. Timing Attacks on Implementations of Diffie-Hellman,RSA, DSS, and Other Systems[C]. Proceedings of Crypto'96, 1996.
  • 9Dhem J F, Koeune F, Leroux P A, et al. A Practical Implementation of the Timing Attack[R]. Universite Catholique de Louvain, Technical Report CG- 1998/1, 1998.
  • 10Schindler W. A Timing Attack Against RSA with the Chinese Remainder Theorem[M]. Springer-Verlag, 2000-08: 109-124.

共引文献1

同被引文献31

  • 1钟楼,张尧弼.并行窗口算法在防御RSA计时攻击中的研究[J].计算机工程与应用,2006,42(12):145-147. 被引量:2
  • 2晏楠,谷大武,丁宁.RSA体制下使用随机算法防御时间攻击的方法[J].计算机工程,2006,32(11):174-176. 被引量:2
  • 3汪晓华,李莹.无线局域网安全性研究[J].安阳师范学院学报,2006(2):59-61. 被引量:3
  • 4侯方勇,谷大武,李小勇.基于Cache的AES攻击:研究进展[J].信息安全与通信保密,2007,29(8):41-43. 被引量:3
  • 5段水福,历晓华,段炼.无线局域网(WLAN)设计与实现[M].杭州:浙江大学出版社,2007:94-98.
  • 6Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard[M]. London, UK: Springer-Verlag, 1993.
  • 7Matsui M. Linear Cryptanalysis Method for DES Cipher[C]// Advances in Cryptelogy-EUROCRYPT. Berlin: Springer-Verlag, 1993:386-397.
  • 8Hagai Bar-E1. Introduction to Side Channel Attacks, Whitepaper. [EB/OL].Israe1:Discretix. com(2003). [2009-09-12].http://www. discretix. com/PDF/Introduction_to_Side_Channel_Attacks. pdf.
  • 9Paul C K. Timing Attacks on Implementations of Die-Hellman, RSA, DSS, and Other Systems [C]//Advanees in Cryptology- CRYPTO' 96. London: SpringerVerlag, 1996:104-113.
  • 10Boneh D, Brumley D. Remote Timing Attacks Are Practical[C]// Proceedings of the 12th conference on USENIX Security Symposium, Washington DC. USA: USENIX, 2003:1-14.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部