期刊文献+

一种改进的针对DSA签名的指令Cache计时攻击

Improved Instruction-Cache Timing Attack on DSA Signature
下载PDF
导出
摘要 针对公钥密码的指令Cache计时攻击是近年来提出的一种新的旁路攻击方式。现有的两种针对公钥密码的指令Cache计时攻击模型尚存在一些不足,一个是攻击前提过于苛刻而难以实现,另一个是无效信息过多导致数据量偏大及后续分析工作量的增加。在充分研究现有模型的基础上,提出一种改进的基于特征Cache组监测的指令Cache计时攻击模型,克服了现有两种模型的不足,在不降低性能的情况下将计时数据减少了约29%,并以DSA数字签名为攻击对象对改进模型进行了实验。 Instruction Cache timing attack on public-key cryptography was newly proposed, which is a subclass of side channel attack. However, there are some shortages in the present models. One is that the precondition of attack is hard to satisfy and the other is that too much useless information results in larger data flow and heavier analysis workload. Based on present models, this paper proposed an improved instruction Cache timing attack model on DSA, which can overcome disadvantages of present models. Experiments were made and the results demonstrate that the im- proved model decreases the data flow by about 29% while the performance is not unchanged.
出处 《计算机仿真》 CSCD 北大核心 2013年第5期208-212,共5页 Computer Simulation
基金 国家自然科学基金资助项目(61272491)
关键词 数字签名算法 公钥签名 指令缓存计时攻击 旁路攻击 DSA Public-key signature Instruction-cache timing attack Side channel attack
  • 相关文献

参考文献9

  • 1P C Kocher. Timing Attacks on Implementations of Diffie-Hell- man, RSA, DSS, and Other Systems [ C ]. CRYPTO 96, Santa Barbara, USA, 1996 : 104-113.
  • 2Dan Page. Theoretical use of Cache memory as a cryptanalytic side- channel[ R ]. Technical Report CSTR- 02 - 003, Department of Com-puter Science, University of Bristol, 2002.
  • 3O Aciicmez. Yet Another MicroArehitectural Attack : Exploiting I- cache[ C]. 14th ACM Conference on Computer and Communica- tions Security ( ACM CCS' 07 ).
  • 4O Aciicmez, W Schindler. A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl [J. In: Topics in Cryptology-CT-RSA 2008. Lecture Notes in Computer cience, Springer Verlag, 2008,4964:256-273.
  • 5O Aclimez, B B Brumley, P Grabher. New Results on Instruction Cache Attacks[ C]. CHES2010, Santa Barbara, USA, 2010 : 110 -124.
  • 6Michael Neve and J P Seifert. Advances on Access-Driven Cache Attacks on AES [ C ], Cryptography ( SAC 06 \ ), 2007.
  • 7D Tsafrir, Y Etsion, D G Feitelson. Secretly monopolizing the CPU without superuser privileges [ C ]. In: Proceedings of the 16th USE- NIX Security Symposium ( SECURITY 2007 ), USENIX Associa- tion, 2007:239-256.
  • 8Percival C. Cache missing for fun and profit[ DB]. <http://www. daemonology, net/papers/htt, pdf>, 2005.
  • 9B B Brumley, R M Hakala. Cache-timing template attacks [ C ]. ASIACRYPT 2009, Tokyo, Japan, 2009:667-684.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部