期刊文献+

针对基于中国剩余定理RSA算法的光故障攻击分析 被引量:1

Optical Fault Attack on CRT-Based RSA
下载PDF
导出
摘要 基于中国剩余定理的RSA算法在智能卡和密码系统中得到广泛的应用,其安全性直接关系到人们的利益.本文使用一种简单的方法对密码芯片进行光故障注入,通过激光照射开封后的芯片,影响密码系统加密过程,获取芯片内部的秘密信息.实验说明对运行基于中国剩余定理RSA算法的密码芯片存在安全隐患. The Chinese Remainder Theorem(CRT)based RSA algorithm is very suitable in smartcard and cryptosystem,however the security benefit people's interest.This paper showed a method to practice an optical injection in cryptographic device.The attack was used laser irradiation the depackaged device to impact cryptographic computation process,obtained the secret information from the inside of chip.This paper presented implementation CRT-RSA algorithm in cryptographic device existed security issue.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第1期38-41,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60940019) 军械工程学院原始创新基金(YSCX0903)
关键词 故障注入 旁路攻击 中国剩余定理 密码芯片 fault injection side channel attack CRT cryptographic chip
  • 相关文献

参考文献8

  • 1Paul Ckocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [C]//19th Annual International Cryptology Conference. California: Advances in Cryptology, 1999.
  • 2邹程,张鹏,邓高明,赵强.差分功率分析攻击中的信号对齐方法研究[J].微电子学与计算机,2009,26(7):227-229. 被引量:4
  • 3Dakshi Agrawal, Bruce Archambeault, Josyula R, et al. Cryptographic hardware and embedded systems [C]//The EM Side-channel(s). California: Springer, 2003.
  • 4邓高明,张鹏,赵强,陈开颜.针对密码芯片的电磁模板分析攻击[J].微电子学与计算机,2010,27(1):1-4. 被引量:7
  • 5Paul C kocher. Timing attacks on Implementations of diffie-hellman, RSA, DSS, and other systems [C]// 16th Annual International Cryptology Conference. California: Advances in Cryptology,1996.
  • 6Korobogatov S. Semi-invasive attacks-a new approach to hardware security analysis[D]. London.. University of Cambridge, Computer Laboratory, 2005.
  • 7Skorobogatov S, Anderson R. Cryptographic hardware and embedded systems workshop 2002[C]// Optical fault Induction attacks. California, 2002.
  • 8Boneh D, Demill R A , Lipton RJ. On the importance of checking cryptographic protocols for faults [C] //Proc. of Advances in Cryptology- EUROCRYPT'97. Konstanz, Germany, 1997, LNCS 1233: 37-51.

二级参考文献14

  • 1张鹏,陈开颜,赵强.PDA上ECC电磁分析神经网络分类方法[J].微电子学与计算机,2006,23(11):137-139. 被引量:1
  • 2邓高明,张鹏,陈开颜,赵强.Cache在旁路攻击中的理论应用及其仿真实现[J].微电子学与计算机,2007,24(5):76-79. 被引量:5
  • 3Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis[J]. Lecture Notes in Computer Science, 1999(1666) : 388 - 397.
  • 4Eric Brier, Christophe Clavier, Francis Olivier, Correlation power analysis with a leakage model[C]//Cryptographic Hardware and Embedded Systems CHES 2004. Berlin: Springer, LNCS 2004(3156) : 16 - 29.
  • 5Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 11 - 19]. http://www. impan.gov.pl/BC/Program/conferences/07Crypt - abs/Aumonier% 20 - % 20SubmissionWorkshopSA.pdf.
  • 6Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks-revealing the secrets of smart cards[ M]. USA: Springer Science Business Media, 2007: 61 - 65.
  • 7Joan Daemen, Vincent Rijmen. The design of rijndael: AES - the advanced encryption standard [ M]. Berlin: Springer-Verlag, 2002.
  • 8Gebotys C, Ho S, Tiu A. EM analysis on rijindael and ECC on a PDA[C]//Proc. of CHES. UK, 2005.
  • 9Paul Kocher. Timing attacks on implementations of diffe - hellman, RSA, DSS, and other systems[ C] // Advances in Cryptography; Proceedings of Crypto '96. New York, Springer- Verlag, 1996.
  • 10Suresh Chaff, Josyula R Rao, Pankaj Rohatgi. Template attacks[ C] // Cryptographic Hardware and Embedded Systems(CHES 2002). Berlin: Springer- Verlag, 2002:13- 28.

共引文献9

同被引文献7

  • 1Pierre-Alain Fouque,Nicolas Guillermin,Delphine Leresteux,Mehdi Tibouchi,Jean-Christophe Zapalowicz.Attacking RSA–CRT signatures with faults on montgomery multiplication[J]. Journal of Cryptographic Engineering . 2013 (1)
  • 2Jean-Pierre Seifert.On authenticated computing and RSA-based authentication. Conference on Computer and Communications Security . 2005
  • 3C. Aum?uller,P. Bier,W. Fischer,P. Hofreiter,J.-P. Seifert.Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Proceedings of CHES ‘02 . 2002
  • 4Schmidt J-M.Differential Fault Analysis. http://www.a-sit.at/pdfs/DFA-Report.pdf . 2008
  • 5Boney D,DeMillo RA,Lipton RJ.On the importance of checking cryptographic protocols for faults. Advances in Cryptology-EUROCRYPT’97 Proceedings . 1997
  • 6Berzati A,Canovas C,Dumas J G,et al.Fault Attacks on RSA Public Keys:Left-to-right Implementations are also Vulnerable. Proceedings of the Cryptographers’’Track at the RSA Conference 2009 . 2009
  • 7Brier E,Chevallier-Mames B,Ciet M,et al.Why One Should Also Secure RSA Public Key Elements. Lecture Notes in Computer Science . 2006

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部