期刊文献+

智能卡RSA算法DPA的攻击与防御

下载PDF
导出
摘要 智能卡在执行算法过程中会泄露一些能耗信息,采用差分能量分析(DPA)利用这些信息可以分析出加密的密钥,其危害远大于传统的数学分析手段。本文对算法级DPA攻击RSA算法方法和已有的算法级防止DPA攻击方法进行了研究,并在此基础上提出一种三重掩盖法来全面防御针对RSA算法的DPA攻击,且进行了仿真,效果明显。
出处 《电信科学》 北大核心 2008年第7期79-81,共3页 Telecommunications Science
基金 北京电子科技学院信息安全与保密重点实验室基金项目(No.YZDJ0605)
关键词 智能卡 DPA RSA 掩盖
  • 相关文献

参考文献8

  • 1Kocher C P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Berlin, August 1999.
  • 2Messerges T S, Dabbish E A, Sloan R H. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002(5): 541-552.
  • 3李欣,范明钰.能量分析攻击及其防御策略研究[J].信息安全与通信保密,2005,27(7):105-107. 被引量:1
  • 4Walter D C. MIST: an efficient, randomized exponentiation algorithm for resisting power analysis. In: Proceedings of the Cryptographer's Track at the RSA Conference on Topics in Cryptology, San Jose, February 2002.
  • 5Messerges T S, Dabbish E A, Sloan R H. Power analysis attacks of modular exponentiation in smart cards. In: Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems, Worcester, August 1999.
  • 6Novak R. SPA-based adaptive chosen-ciphertext attack on RSA implementation. In: PKC 2002, Paris, February 2002.
  • 7Manger J. A chosen ciphertext attack on RSA. Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. CRYPTO 2001, 2001.
  • 8Klima V, Rosa T. Further results and considerations on side channel attacks on RSA. In: CHES 2002, San Francisco Bay, August 2002 .

二级参考文献10

  • 1E.Biham and A.Shamir. Differential Cryptanalysis of the Data Encryption Standard. 1999. Springer-Verlag.
  • 2L.Goubin, J.Patarin. DES and Differential Power Analysis. Proceedings of CHES' 99, Lecture Notes in Computer Science.1999. vol.1717, Springer-Verlag. 158-172.
  • 3E.Hess, N.Janssen, B.Meyer, T.Schutze. Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures. Proceedings of EUROSMART Security Conference, 2000. 55-64.
  • 4C.Clavier, J.Coron, N.Dabbous. Diferential Power Analysis in the Presence of Hardware Countermeasures. Proceedings of Cryptographic Hardware and Embedded Systerms(CHES2000), Lecture Notes in Computer Science. 2000. 252-263.
  • 5L.Benini, A.Macii, E.Macii, etc. Energy-Aware Design Techniques for Differential Power Analysis Protection. DAC-40: ACM/IEEE Design Automation Conference. 2003. 36-41.
  • 6P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. In Advances in Cryptology, CRYPTO'99. 1999. Springer LNCS 1666. 386-397.
  • 7N.P.Smart. Physical Side-Channel Attacks on Cryptographic Systems. Software Focus. 2000. 1(2): 6-13.
  • 8P.Kocher. Timing attacks on implementations of Diffie-Hellman, RSA,DSS and other systems. In Advances in Cryptology,CRYPTO' 96. 1996. Springer LNCS 1109. 104-113.
  • 9T.Messerges, E.Dabbish. R.Sloan. Investigations of Power Analysis Attacks on Smartcards. Proceedings of USENIX Workship Smartcard Technology. 1999. 151-161.
  • 10National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standards Publication 46. 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部