期刊文献+

针对RSA的简单功耗分析攻击实验 被引量:1

Experiment of SPA Attack Against RSA
下载PDF
导出
摘要 阐明了集成电路中基本单元CMOS逻辑门在实现加密算法时的功耗特征及数据功耗相关特性。利用AT89C52单片机实现了RSA嵌入式加密系统,在此基础上进行实验,得到了一个RSA加密实现的功率轨迹,通过对功率轨迹的分析,直接读出密钥。实验结果表明,简单功耗分析对于没有任何防护措施的RSA加密实现的攻击是十分简单而且高效的。 Explains the relation of the power consumption characters and data--dependent power consumption of CMOS logic gates which form the integrated circuits (ICs). A RSA cipher system was implemented with an AT89C52 SCM, and with this expriment platform, a power trace of R, SA encryption was obtained. It gets the power trace of a PSA encryption algorithm through the physical experiment, and directly gets the key with the SPA. The result indicates that attacking P, SA encrypted systems without some extra protective measures SPA is quite easy and efficient.
机构地区 军械工程学院
出处 《计算机安全》 2009年第2期16-18,共3页 Network & Computer Security
关键词 RSA 简单功耗分析 功率轨迹 RSA Simple Power Analysis power trace
  • 相关文献

参考文献1

二级参考文献6

  • 1Kocher P,Jaffe J,Jun B..Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO' 99),Santa Barbara,USA,1999,388~397
  • 2Rivest R.L,Shamir A,Adleman L..A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM,1978,21(2):120~126
  • 3Messerges T.S,Dabbish E.A,Sloan R.H..Power analysis attacks of modular exponentiation in smartcards.In:Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'99),Worcester,USA,1999,144~157
  • 4Brickel E.F..A survey of hardware implementations of RSA.In:Proceedings of the Advances in Cryptology (CRYPTO'89),Santa Barbara,USA,1990,368~370
  • 5Montgomery P.L..Modular multiplication without trial division.Mathematics of Computation,1985,44(170):519~521
  • 6Messerges T.S..Power analysis attacks and countermeasures for cryptographic algorithms[Ph.D.dissertation].Graduate College of the University of Illinois at Chicago,2000

共引文献18

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部