摘要
研究了RSA密码算法的差分功耗分析防御方法.通过对自随机化模幂算法的分析,提出将BBS随机数发生器和侧信道原子化技术应用于改进的算法中,得到侧信道原子化的严格自随机化模幂算法.仿真实验结果证明,该方法可以有效防御差分功耗分析攻击.
In this paper, the defense mechanism of differential power analysis attacks on the RSA cipher algorithm is discussed. Based on analyses of self-randomized modular exponentiation algorithm, a new side-channel atomic strict self-randomized modular exponentiation algorithm is proposed in which a BBS random number generator and the side-channel atomic technology are applied to improve the original algorithm. The results of simulation experiments indicate that this method is effective and practical to prevent differential power analysis attacks.
出处
《微电子学与计算机》
CSCD
北大核心
2010年第2期129-132,共4页
Microelectronics & Computer
基金
国家自然科学基金项目(60606005)
关键词
RSA
差分功耗分析
侧信道原子化
严格自随机化
RSA
differential power analysis
side-channel atomicity
strict self-randomization