期刊文献+

Cache计时攻击对ElGamal签名的安全威胁分析

Analysis of Vulnerability in EIGamal Signature Due to Cache Timing Attack
下载PDF
导出
摘要 分析了E1Gamal签名中模幂运算的平方乘算法和滑动窗口算法,给出了两种算法下利用Cache计时采集旁路信息的方法和幂指数恢复算法,分析了Cache计时攻击对幂指数相关的旁路信息获取能力以及Cache计时攻击对E1Gamal签名的安全性威胁.通过仿真验证了Cache计时攻击能够有效获取旁路信息,展示了不同长度随机密钥的安全等级,给出了建议采用的随机密钥长度与可能的防御措施. This paper analyzes square-multiplication method and sliding window method for modular exponentiation used in ElGamal signature, and proposes corresponding technology of collecting side channel information with Cache timing and algorithms for recovering exponent. The ability to gain exponent-related side channel information and the impact on E1Gamal signature are analyzed. The results of simulation experiment demonstrate the ability of Cache tim ing attack and show the security levels of varied keysizes. The suggested keysize of nonce and pos- sible countermeasures are pointed out.
出处 《军械工程学院学报》 2012年第5期42-48,共7页 Journal of Ordnance Engineering College
基金 国家自然科学基金资助项目(61173191)
关键词 CACHE计时攻击 ELGAMAL签名 模幂运算 随机密钥 Cache timing attack ElGamal signture modular exponentiation nonce
  • 相关文献

参考文献24

二级参考文献160

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:66
  • 2侯方勇,谷大武,李小勇.基于Cache的AES攻击:研究进展[J].信息安全与通信保密,2007,29(8):41-43. 被引量:3
  • 3国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 4PAUL C,KOCHER.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[A].CRYPTO 1996[C].Springer,1996.104-113.
  • 5QUISQUATER J J,SAMYDE D.Electromagnetic analysis(EMA):measures and countermeasures for smart cards[A].Smart Cards Programming and Security(E-Smart 2001)[C].Springer,2001.200-210.
  • 6BONEH D,DEMILLO R A,LIPTON R J.On the importance of checking cryptographic protocols for faults[A].EUROCRYPT'97[C].Konstanz,Germany,1999.37-51.
  • 7BRUMLEY D,BONEH D.Remote timing attacks are practice[A].Proceedings of the 12th Usenix Security Symposium[C].Washington,DC,2003.1-14.
  • 8COLIN P.Cache missing for fun and profit[EB/OL].http://www.daemonology.net/hyperthreading-considered-harmful/,2005.
  • 9YUKIYASU T,TERUO S,TOMOYASU S,et aL.Cryptanalysis of DES implemented on computers with Cache[A].Cryptographic Hardware and Embedded Systems-CHES 2003[C].Springer,2003.62-76.
  • 10DANIEL J,BERNSTEIN.Cache-timing attacks on AES[EB/OL].hap://cr.yp.to/papers.html\#Cachetiming,2004.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部