摘要
RSA-CRT作为RSA的一种快速实现方式,被广泛应用于智能卡等计算能力有限的设备。文中提出一种针对该实现方式的旁路攻击方法,通过选择合适的输入数据,对模余运算之后的中间结果进行功耗分析。该方法先确定其中一个素数的位数,根据素数的位数选择合适的输入数据再进行一次差分功耗分析攻击,逐字节得到该素数。仿真实验结果表明,新的攻击方案是行之有效的,与在同一位置进行攻击的MRED方法相比,新方法减少了所需要的功耗波形条数,有效地提高了攻击效率。
As a fast RSA implementation,RSA-CRT is widely applied to computing-limited devices,such as smart cards.This paper describes a side channel attack against RSA-CRT implementation.By properly choosing input data,the power consumption of the intermediate value after the modular reduction is analyzed.This attack first determines the size of one of the primes,then based on it,takes another DPA attack and gets the byte-by-byte prime.The simulation experiment shows that this attack is effective,and relative to MRED,could reduce the number of needed power traces and raise the attack efficiency.
出处
《通信技术》
2011年第6期123-125,128,共4页
Communications Technology