期刊文献+

一种针对采用SPA-FA防御措施的RSA故障分析算法

A RSA Fault Analysis Algorithm of SPA-FA Resistant Measures
下载PDF
导出
摘要 在对RSA密码算法和安全错误攻击原理进行研究的基础上,以硬件模乘法器实现的模幂算法为分析对象,提出一种针对采用抗SPA-FA防御措施的RSA故障分析算法。攻击者利用在模幂运算过程中对其中的乘数寄存器注入故障,再通过判断最后输出结果的正确性来判断相应密钥位的值,并从3个方面给出算法的可行性分析。结果证明了RSA算法在采用硬件乘法器情况下的安全漏洞,能为有效防护算法的安全和研究提供参考。 To research the principle of safe-error attack and RSA algorithm,the modular measures based on the hardware modular multiplier is taken as the analyzed target.Propose a fault analysis on RSA using SPA-FA resistant.The attacker inject fault into one of the multipliers during the modular exponentiation,and then it can use the output to deduce the corresponding bits of key.The vulnerability of RSA using SPA-FA resistant based on hardware modular multiplier is proved in theory,the practicability of the attack is analyzed in three aspects.The result shows that RSA algorithm can provide effective resistant measures safety and research with reference when there is safety leak in hardware multiplication situation.
出处 《兵工自动化》 2011年第6期91-93,96,共4页 Ordnance Industry Automation
基金 国家自然科学基金(60772082) 河北省自然科学基金(08M010)资助
关键词 旁路攻击 RSA算法 安全错误攻击 故障分析 SPA-FA防御措施 side channel attack RSA algorithm safe-error attack fault analysis SPA-FA resistant measures
  • 相关文献

参考文献14

  • 1Bench D, DeMillo R, Lipton R. On the importance of checking cryptographic protocols for faults[C]. Heidelberg : In Fumy, W. (ed.) EUROCRYPT 1997. LNCS, 1997: 37-51.
  • 2Boscher A, Naciri R, Prouff E. CRT RSA algorithm protected against fault attacks[C]. In: Sauveron D, Markantonakis K, Bilas A, Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg, 2007, 4462: 237-252.
  • 3Aum'" uller C, Bier P, Fischer W, Hofreiter P, Seifert J.-E Fault attacks on RSA with CRT: Concrete results and practical countermeasures[C]. In: Kaliski Jr., B.S., Ko, c, C, .K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg, 2003, 2523: 260-275.
  • 4Shamir A. Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent "5,991,415[P]. 1999-11-23. Also presented at the rump session of EUROCRYPT 1997.
  • 5Yen, S.-M., Kim S, Lim S, Moon S. RSA speedup with Chinese Remainder Theorem immune against hardware fault cryptanalysis[J]. IEEE Transactions on Computers, 2003, 52(4): 461-472.
  • 6Joye M, Paiiler P, Yen, S.-M. Secure evaluation of modular functions[J]. International Workshop on Cryptology and Network Security 2001, 2001: 227-229.
  • 7Wagner D. Cryptanalysis of a provably secure CRT-RSA algorithm[C]. New York: l lth ACM Conference on Computers and Communications Security, ACM Press, 2004: 92-97.
  • 8Yen, S.-M., Joye M. Checking before output may not be enough against fault based cryptanalysis[J]. IEEE Transactions on Computers, 2000, 49(9): 967-970.
  • 9Ors S B, Batina L, Preneel B, Vandewalle J. Hardware implementation of a Montgomery modular multiplier in a systolic array[C]. In: Proceedings of the 17th International Symposium on Parallel and Distributed Processing, IEEE Computer Society, Los Alamitos, 2003: 1-8.
  • 10Giraud C. Fault resistant RSA implementation[C]. D. Walter C, Ko, c, C, .K., Paar, C. (eds.) CHES 2003. Springer, Heidelberg, 2003, 2779: 142-151.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部