期刊文献+

RSA密码算法的安全及有效实现 被引量:8

Secure and Efficient Implementation for RSA Cryptographic Algorithm
下载PDF
导出
摘要 RSA密码算法的实现电路易受到诸如能量分析、时间分析等旁门攻击。综述了RSA密码算法中模幂运算的主要攻击方法及其防御措施。针对模幂运算的软件实现和硬件实现,提出了基于随机概率的软件实现防御措施和基于模幂指数三进制表示的硬件实现防御措施。两种防御措施较之前的防御措施在安全性和效率方面都有显著的提高。两种防御措施具有通用性,可移植到ECC中的标量乘法运算中去。 The implementation of RSA cryptosystems is vulnerable to SCA attacks such as power analysis and time attack. First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized. Then the software countermeasures based on random probability and hardware countermeasure based on the 3-adic representation of exponent were proposed. Analysis shows that the two countermeasures achieved great improvements in both security and efficiency compared to existed countermeasures. Both two generic countermeasures can be transplanted to the scalar multiplication of ECC.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第6期22-26,共5页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金资助项目(90607005) 国家"863"高科技研究发展计划基金资助项目(2007AA012448) 江苏省"六大人才高峰"资助项目(06-E-025)
关键词 RSA密码算法 旁门攻击 软件实现 硬件实现 模幂 RSA cryptographic algorithm side channel attacks software implementation hardware implementation exponentiation
  • 相关文献

参考文献11

  • 1KOCHER C. Timing attacks on implementations of Diffie- Hellman, RSA , DSS, and other systems [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 96), Springer-Verlag, 1997 : 104 - 113. 被引量:1
  • 2KOCHER C, JAFFE J, JUN B. Differential power analysis [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 99), Springer- Verlag, 1999 : 388 - 397. 被引量:1
  • 3MONTGOMERY P L. Speeding the Pollard and elliptic curve methods of factorization [ J ]. Mathematics of Computation, 1987, 48 (177) : 243 - 264. 被引量:1
  • 4MESSERGES T S. DABBISH E A, SLOAN R H. , Power analysis atta-cks of modular exponentiation in smartcards [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 99 ), Springer-Verlag, 2000 : 144 - 157. 被引量:1
  • 5韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 6MESSERGES T S. Power analysis attacks and countermeasures for cryptographic algorithms [ D ]. Chicago:Graduate College of the University of Illionois, 2000. 被引量:1
  • 7WALTER C. Sliding windows succumbs to big mac attack [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems( CHES'01 ), Springer- Verlag, 2001:286 - 299. 被引量:1
  • 8VLASTIMILI K, TOMAS R, Futher results and considerations on side channel attacks on RSA [ C]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 02 ), Springer-Verlag, 2002 : 244 - 259. 被引量:1
  • 9CORON J S. Resistance against differential power analysis for elliptic curve cryptosystems [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( C HES' 99 ). Springer-Verlag, 1999:292 - 302. 被引量:1
  • 10KOBLITZ N. Elliptic curve cryptosystems [ J ]. Mathematics of Computation, 1987, 48 (177) : 203 - 209. 被引量:1

二级参考文献6

  • 1Kocher P,Jaffe J,Jun B..Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO' 99),Santa Barbara,USA,1999,388~397 被引量:1
  • 2Rivest R.L,Shamir A,Adleman L..A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM,1978,21(2):120~126 被引量:1
  • 3Messerges T.S,Dabbish E.A,Sloan R.H..Power analysis attacks of modular exponentiation in smartcards.In:Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'99),Worcester,USA,1999,144~157 被引量:1
  • 4Brickel E.F..A survey of hardware implementations of RSA.In:Proceedings of the Advances in Cryptology (CRYPTO'89),Santa Barbara,USA,1990,368~370 被引量:1
  • 5Montgomery P.L..Modular multiplication without trial division.Mathematics of Computation,1985,44(170):519~521 被引量:1
  • 6Messerges T.S..Power analysis attacks and countermeasures for cryptographic algorithms[Ph.D.dissertation].Graduate College of the University of Illinois at Chicago,2000 被引量:1

共引文献18

同被引文献73

引证文献8

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部