期刊文献+

一种针对RSA-CRT的功耗分析攻击方法 被引量:7

A Power Analysis Attack Against RSA-CRT
原文传递
导出
摘要 RSA-CRT作为RSA的一种快速实现方式,被广泛应用于智能卡等计算能力有限的设备。文中提出一种针对该实现方式的旁路攻击方法,通过选择合适的输入数据,对模余运算之后的中间结果进行功耗分析。该方法先确定其中一个素数的位数,根据素数的位数选择合适的输入数据再进行一次差分功耗分析攻击,逐字节得到该素数。仿真实验结果表明,新的攻击方案是行之有效的,与在同一位置进行攻击的MRED方法相比,新方法减少了所需要的功耗波形条数,有效地提高了攻击效率。 As a fast RSA implementation,RSA-CRT is widely applied to computing-limited devices,such as smart cards.This paper describes a side channel attack against RSA-CRT implementation.By properly choosing input data,the power consumption of the intermediate value after the modular reduction is analyzed.This attack first determines the size of one of the primes,then based on it,takes another DPA attack and gets the byte-by-byte prime.The simulation experiment shows that this attack is effective,and relative to MRED,could reduce the number of needed power traces and raise the attack efficiency.
出处 《通信技术》 2011年第6期123-125,128,共4页 Communications Technology
关键词 RSA-CRT 功耗分析 模余 MRED RSA-CRT power analysis modular reduction MRED
  • 相关文献

参考文献10

  • 1KOCHER P,JAFFE J,JUN B.Differential Power Analysis[C] //CRYPTO '99.[s.1.] :Springer-Verlag,1999:388-397.
  • 2NOVAK R,SPA-Based Adaptive Chosen-Ciphertext Attack on RSAImplementation[C] //PKC 2002.[s.1.] :Springer-Verlag,2002:256-261.
  • 3FOUQUE P A,MARTINET G,POUPARD G,Attacking Unbalanced RSA-CRT Using SPA[C] // CHES 2003.[s.1.] :Springer-Verlag,2003:254-268.
  • 4BOER B den,LEMKE K,WICKE G.A DPA Attack Against the Modular Reduction within a CRT Implementation of RSA[C] // CHES 2002.[s.l.] :Springer-Verlag,2003:228-243.
  • 5WITTEMAN M.A DPA Attack on RSA in CRT Mode,[EB/OL].(2009-4-3).[2010-08-06].http://www.riscure.com/fileadmin/images/Docs/DPA attack on RSA in CRT mode by Riscure.pdf.
  • 6STINSON Douglas R,Cryptography:Theory and Practice[M].Third Edition.[s.l.] :CRC Press,2006.
  • 7van MENEZES A P,van OORSCHOT P,VANSTONE S.Handbook of Applied Cryptography[M].[s.l.] :CRC Press,1996.
  • 8李海斌,周玉洁.一种抗DPA攻击的DES设计[J].通信技术,2007,40(11):277-279. 被引量:9
  • 9张剑峰,钱晶晶,谈慧宇,高进涛.智能卡抗DPA攻击的设计与实现[J].现代电子技术,2009,32(9):82-85. 被引量:3
  • 10JIN JIFANG,LU ERHONG,GAO XIANWEI,Resistance DPA of RSA on Smartcard[C] // IAS' 09.DC,USA:IEEE Computer Society Washington,2009:406-409.

二级参考文献19

  • 1赖坤锋.智能卡SPA&DPA攻击[J].现代电子技术,2005,28(17):28-29. 被引量:3
  • 2毛丰江,温希东.智能卡攻击技术与安全策略的研究[J].计算机工程与设计,2006,27(13):2396-2399. 被引量:7
  • 3Messerges T S, Dabbish E A, Sloan R H. Investigations of Power Analysis Attacks on Smart Cards[A]. Proceeding of USENIX Workshop on Smartcard Technology [C]. 1999: 151 -161.
  • 4Messerges T. Using Second Order Power Analysis to Attack DPA Resistant Software[A]. Cryptographic Hardware and Embedded Systems[C]. Springer - Verlag, 2000 : 238 - 251.
  • 5Sibley E H. Random Number Generators: Good OnesAre Hard to Find[J]. Communications of the ACM, 1998, 31 (10) :1192 - 1201.
  • 6FIPS PUB 46 - 3, Data Encryption Standard, Federal Information Processing Standards Publication Reaffirmed 1999 October 25,U. S. Department of Commerce/National Institute of Standards and Technology.
  • 7FIPS PUB 197, Advaced Encryption Stand- ard (AES), Federal Information Processing Standards Publication Reaffirmed Nove- tuber 26,2001, U. S. Department of Commerce/National Institute of Standards and Technology.
  • 8Rivest R L, Shamir A, Adelman L M. A Method for Obtaining Digital Signatures and Public - key Crypto Systems[J].Communications of the ACM, 1978,21 : 120 - 126.
  • 9Data Encryption Standard. Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards[S]. US Department of Commerce, Washington DC, 1977.
  • 10Anderson, Kuhn M 6. Low Cost Attacks on Taeper Resistant Devices[C]. In : Proceedings of the 5th International Workshop on Security Protocols , Paris , 1997:125-136

共引文献9

同被引文献27

  • 1韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 2KOCHER P, JAFFE J, JUN B. Differential PowerAnalysis[C]// CRYPTO, 99. Heidelberg, German:Springer-Verlag, 1999:388-397.
  • 3SOKOLOV D, MURPHY J, BYSTR0Y A, et al. Improvingthe Security of Dual-Rail Circuits[C]// CHES 2004.LCNS. Heidelberg, German: Springer-Verlag, 2004:255-317.
  • 4RAZAFINDRAIBE A, ROBERT M, MAURINE P. Analysis andImprovement of Dual Rail Logic as a CountermeasureAgainst DPA[C]// PATM0S 2007. LCNS. Heidelberg,German:Springer-Verlag, 2007:340-351.
  • 5H00GV0RST P, DUC G, DANGER J. SoftwareImplementation of Dual-Rail Representation [EB/OL].(2011-2-24)[2011-2-24]. http://cosade2011. cased,de/files/201l/cosade201l.talk8.paper. pdf.
  • 6BOGDANOV A, KNUDSEN L, LEANDER G at el. PRESENT:An Ultra-Lightweight Block Cipher [C]// CHES 2007.LCNS. Heidelberg, German: Springer-Verlag, 2007:450-466.
  • 7陈廷定.密码芯片的侧信道安全性分析和量化评估[D].济南:山东大学,2010.
  • 8李海斌,周玉洁.一种抗DPA攻击的DES设计[J].通信技术,2007,40(11):277-279. 被引量:9
  • 9秦宝东,李明,孔凡玉.Cryptanalysis of a Type of CRT-Based RSA Algorithms[J].Journal of Computer Science & Technology,2008,23(2):214-221. 被引量:1
  • 10蒋烨,薛质,王轶骏.非接触式IC卡干扰式旁路攻击与防护[J].信息安全与通信保密,2008,30(3):52-54. 被引量:2

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部