期刊文献+

针对随机伪操作的简单功耗分析攻击 被引量:3

Simple power analysis attack on random pseudo operations
下载PDF
导出
摘要 讨论针对随机伪操作椭圆曲线密码标量乘算法的SPA攻击,理论推导和实测结果均表明,在单样本SPA攻击下,即可在功耗曲线中获取大量的密钥信息;而在针对算法中随机操作漏洞的一种新型多样本SPA攻击—多样本递推逼近攻击下,用极小样本量就可完整破译密钥。当密钥长度为n时,该攻击方法完整破译密钥所需的样本数仅为O(lb n)。 Random pseudo-operations on elliptic curve scalar multiplication algorithm, less secure than it claimed by simple power analysis (SPA) attacks. Even in the single curve SPA, it leaks lots of useful key information. Multiple curve recursive approximation attack (MCRAA), a new multiple curve SPA attack, was proposed to get all of the key information with a small curve set. When the length of the key is n, the size of the set is O(lbn) which was confirmed by experiment.
作者 王敏 吴震
出处 《通信学报》 EI CSCD 北大核心 2012年第5期138-142,共5页 Journal on Communications
基金 国家自然科学基金资助项目(60873216) 四川省科技支撑计划基金资助项目(2011GZ0170)~~
关键词 信息安全 边信道攻击 简单功耗分析攻击 随机伪操作 多样本递推逼近攻击 information security side-channel attack simple power analysis random pseudo operation multiple curve recursive approximation attack
  • 相关文献

参考文献9

  • 1KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Lecture Notes in Computer Science; Proceedings of the 19th Annual Interna- tional Cryptology. Conference on Advances in Cryptology[C]. 1999. 388- 397.
  • 2KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Advances in Cryptology- CRYPTO'96, of Lecture Notes in Computer Science[C]. 1996. 104-113.
  • 3朱冰,陈运,吴震,陈俊,刘鹤.一种抗简单功耗分析攻击的椭圆曲线标量乘快速实现算法[J].成都信息工程学院学报,2011,26(1):5-10. 被引量:2
  • 4廖嘉,夏国坤,王立鹏,刘寅立.抵抗SPA和DPA的椭圆曲线上点的标量乘法[J].天津科技大学学报,2009,24(2):67-69. 被引量:2
  • 5TETSUYA I, BODO M, TSUYOSH T. Improved elliptic curve multiplication methods resistant against side channel attacks[A]. Progress in Cryptology, LNCS 2551[C]. Springer-Verlag, 2002. 295-3 l 3.
  • 6MILLER V S. Use of elliptic curves in cryptography[A]. Proceedings of Crypto 85 LNCS 218[C]. Springer, 1986. 417-426.
  • 7KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Com- putation, 1987,(48):203- 209.
  • 8ACICMEZ O, SEIFERT J P, KOC C K. Predicting secret keys via branch prediction[A]. Topics in Cryptology-CT-RSA 2007, Leture Notes in Computer Science[C]. 2006.225-242.
  • 9ACIICMEZ O, KOC C K, SEIFERT J P. On the Power of Simple Branch Prediction Analysis[R]. Cryptology ePrint Archive, 2006. 312-320.

二级参考文献10

共引文献2

同被引文献15

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部