智能卡RSA算法DPA的攻击与防御
摘要
智能卡在执行算法过程中会泄露一些能耗信息,采用差分能量分析(DPA)利用这些信息可以分析出加密的密钥,其危害远大于传统的数学分析手段。本文对算法级DPA攻击RSA算法方法和已有的算法级防止DPA攻击方法进行了研究,并在此基础上提出一种三重掩盖法来全面防御针对RSA算法的DPA攻击,且进行了仿真,效果明显。
出处
《电信科学》
北大核心
2008年第7期79-81,共3页
Telecommunications Science
基金
北京电子科技学院信息安全与保密重点实验室基金项目(No.YZDJ0605)
参考文献8
-
1Kocher C P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Berlin, August 1999.
-
2Messerges T S, Dabbish E A, Sloan R H. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002(5): 541-552.
-
3李欣,范明钰.能量分析攻击及其防御策略研究[J].信息安全与通信保密,2005,27(7):105-107. 被引量:1
-
4Walter D C. MIST: an efficient, randomized exponentiation algorithm for resisting power analysis. In: Proceedings of the Cryptographer's Track at the RSA Conference on Topics in Cryptology, San Jose, February 2002.
-
5Messerges T S, Dabbish E A, Sloan R H. Power analysis attacks of modular exponentiation in smart cards. In: Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems, Worcester, August 1999.
-
6Novak R. SPA-based adaptive chosen-ciphertext attack on RSA implementation. In: PKC 2002, Paris, February 2002.
-
7Manger J. A chosen ciphertext attack on RSA. Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. CRYPTO 2001, 2001.
-
8Klima V, Rosa T. Further results and considerations on side channel attacks on RSA. In: CHES 2002, San Francisco Bay, August 2002 .
二级参考文献10
-
1E.Biham and A.Shamir. Differential Cryptanalysis of the Data Encryption Standard. 1999. Springer-Verlag.
-
2L.Goubin, J.Patarin. DES and Differential Power Analysis. Proceedings of CHES' 99, Lecture Notes in Computer Science.1999. vol.1717, Springer-Verlag. 158-172.
-
3E.Hess, N.Janssen, B.Meyer, T.Schutze. Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures. Proceedings of EUROSMART Security Conference, 2000. 55-64.
-
4C.Clavier, J.Coron, N.Dabbous. Diferential Power Analysis in the Presence of Hardware Countermeasures. Proceedings of Cryptographic Hardware and Embedded Systerms(CHES2000), Lecture Notes in Computer Science. 2000. 252-263.
-
5L.Benini, A.Macii, E.Macii, etc. Energy-Aware Design Techniques for Differential Power Analysis Protection. DAC-40: ACM/IEEE Design Automation Conference. 2003. 36-41.
-
6P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. In Advances in Cryptology, CRYPTO'99. 1999. Springer LNCS 1666. 386-397.
-
7N.P.Smart. Physical Side-Channel Attacks on Cryptographic Systems. Software Focus. 2000. 1(2): 6-13.
-
8P.Kocher. Timing attacks on implementations of Diffie-Hellman, RSA,DSS and other systems. In Advances in Cryptology,CRYPTO' 96. 1996. Springer LNCS 1109. 104-113.
-
9T.Messerges, E.Dabbish. R.Sloan. Investigations of Power Analysis Attacks on Smartcards. Proceedings of USENIX Workship Smartcard Technology. 1999. 151-161.
-
10National Bureau of Standards. Data Encryption Standard. Federal Information Processing Standards Publication 46. 1999.
-
1周国鑫,尹慧琳.面向AES密码芯片的DPA攻击技术研究[J].计算机与现代化,2012(2):153-155. 被引量:1
-
2赵东艳,何军.针对密码算法的高阶DPA攻击方法研究[J].电子技术应用,2013,39(10):56-58. 被引量:4
-
3王灏然,肖玉珺,徐文渊,程鹏.基于旁路信息的PLC安全监控系统[J].工业控制计算机,2016,29(6):74-76. 被引量:2
-
4王建国,梁晓斌.宽带城域网的安全管理[J].有线电视技术,2008,15(9):73-74. 被引量:1
-
5王振华.无线传感器网络网络层的攻击与防御技术研究[J].无线互联科技,2017,14(1):16-18.
-
6钱思进,张凯泽,王衍波,何德全.DES加密算法差分能量分析的研究[J].计算机工程与应用,2007,43(32):146-148. 被引量:2
-
7张铁楠.一种基于电子商务的全面防御安全模型研究[J].计算机时代,2014(11):4-6. 被引量:2
-
8徐森.ARP欺骗在局域网中的分析及防御[J].数字技术与应用,2010,28(5):49-49. 被引量:1
-
9杨宏伟.局域网内ARP欺骗的防御与MAC地址绑定的分析[J].经济研究导刊,2010(8):254-255.
-
10万厚伦.关于局域网中的ARP欺骗及防范研究[J].信息与电脑(理论版),2010(4):150-150.