期刊文献+

RSA公钥密码算法差分计时攻击研究 被引量:6

Research of Differential Timing Attack on RSA Public-key Cryptographic Algorithm
下载PDF
导出
摘要 RSA密码算法执行过程中的模幂运算时间是不固定的,精确测量解密过程中泄露出的时间差异信息即可推断出相关密钥。为此,研究RSA公钥密码算法的实现和计时攻击原理,分析RSA解密运算过程,找出RSA在计时攻击中存在的安全缺陷。在简单计时攻击的基础上,提出基于从左到右"平方-乘法"模幂运算的RSA差分计时攻击算法,并介绍相应的防御措施。 The time of modular exponentiation is not constant when RSA cryptographic algorithm is executed,so carefully measuring the information about different time to decrypt can deduce the secret key.This paper researches the implementation of RSA public-key cryptographic algorithm and the principle of the timing attack,analyzes the process of RSA decryption,discovers the vulnerabilities of RSA on timing attack,presents the algorithm of differential timing attack on RSA using from left to right "square-multiply" modular exponentiation,and discusses how to defense timing attack on RSA.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第5期146-148,共3页 Computer Engineering
基金 国家自然科学基金资助项目"基于Cache的远程计时攻击研究"(60772082) 军械工程学院科学研究基金资助项目
关键词 旁路攻击 差分计时攻击 模幂运算 公钥密码 side channel attack differential timing attack modular exponentiation public-key cryptography
  • 相关文献

参考文献5

  • 1Kocher E Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems[C]//Proc. of CRYPTOLOGY'96. Berlin, Germany: Springer-Verlag, 1996.
  • 2Dhem J F, Koeune K, Leroux P A, et al. A Practical Implemen- tation of the Timing Attack[C]//Proc. of CARDIS'98. Toulouse, France: [s. n.], 1998.
  • 3Intel Corporation. Using the RDSTC Instruction for Performance Monitoring[Z]. 1997.
  • 4陈财森,王韬,郑媛媛,赵新杰.RSA公钥密码算法的计时攻击与防御[J].计算机工程,2009,35(2):123-125. 被引量:9
  • 5Brumley D, Boneh D. Remote Timing Attacks Are Practical[C]// Proc. of the 12th Usenix Security Symposium. Washington D. C., USA: [s. n.], 2003.

二级参考文献9

  • 1RSA Laboratories[Z]. [2007-12-11]. http://www.rsasecurity.com/rsalabs/node.asp?id=2098.
  • 2Kocher P. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[C]//Proc. of CRYPTOLOGY'96. Berlin, Germany: Springer-Verlag, 1996.
  • 3Kaliski B. Timing Attacks on Cryptosystems[EB/OL]. RSA Laboratories. (1996-01-20). http://www.rsasecurity.com/rsa-labs.
  • 4Burton D M. Elementary Number Theory[M]. 2nd ed. [S. l.]: Brown Publishers, 1989.
  • 5Kaihara M E, Naofumi T. A Hardware Algorithm for Modular Multiplication/Division Based on the Extended Euclidean Algorithm[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005, E88-A(12): 3610- 3617.
  • 6Dhem J F, Koeune F. A Practical Implementation of the Timing Attack[C]//Proc. of CARDIS'98. [S. l.]: Springer, 1998.
  • 7Brumley D, Bonoeh D. Remote Timing Attacks Are Practical[DB/ OL]. [2008-05-10]. http://crypto.stanford.edu/-dabo/papers/ssltiming.pdf.
  • 8Stallings W.密码学编码学与网络安全——原理与实践[M].4版.孟庆树,王丽娜,傅建明,等,译.北京:电子工业出版社,2006.
  • 9Wing Wong. Timing Attacks on RSA: Revealing Your Secrets Through the Fourth Dimension[DB/OL]. [2008-04-10]. http://www.cs.sjsu.edu/faculty/stamp/students/article.html.

共引文献8

同被引文献68

  • 1邵惠鹤.支持向量机理论及其应用[J].自动化博览,2003,20(z1):90-95. 被引量:7
  • 2袁晓宇,张其善.基于智能卡的RSA数字签名实现关键问题解析[J].电子学报,2004,32(11):1897-1900. 被引量:11
  • 3张仕斌,何大可,代群.PKI安全认证体系的研究[J].计算机应用研究,2005,22(7):127-130. 被引量:19
  • 4赖建华,汪宏伟.PKI体系私钥保护机制研究[J].情报探索,2006(1):42-44. 被引量:4
  • 5Hadi M, Erfan K M, Behazd K, et al. An efficient algorithm resistant to SPA and DPA variants in ECC [C]. IFIP Wireless Days, 2008.
  • 6Osvik D A, Shamir A, Tromer E. Cache attacks and counter- measures: The case of AES [G]. LNCS 3860: 2006: 1- 20.
  • 7LI W, GU D W, LI J R. Differential fault analysis on the ARIA algorithm [J ]. Information Sciences, 2008, 178 ( 19 ) 3727- 3737.
  • 8Bog danov A, Knudsen L R, Leander G, et al. PRESENT: An ultra lightweight block cipher [G]. LNCS 4727: Proc Work- shop Cryptographic Hardware and Embedded Systems, 2007: 450- 466.
  • 9LI Huiyun, Markettos A T, Moore S. Security evaluation against electromagnetic analysis at design time [C]. Interna- tional Conference on Cryptographic Hardware and Embedded System, 2005: 183-188.
  • 10Kopf B, Basin D. An information-theoretic model for adaptive side-channel attacks [C]. Proceedings of ACM CCS, 2007~ 286-296.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部