期刊文献+

RSA密码芯片简单功耗分析

SPA against RSA cipher chip
下载PDF
导出
摘要 利用AT89C52单片机实现了RSA嵌入式加密系统,通过实验得到了一个RSA加密过程的功率轨迹,对功率轨迹进行分析,直接读出密钥。实验结果表明,简单功耗分析对于没有任何防护措施的RSA加密实现的攻击是十分简单而且高效的。最后,提出了可证明安全的抵御SPA攻击的RSA加密方案的设计方法。 A RSA cipher system was implemented with an AT89C52 SCM. It gets the power trace of a RSA encryption algorithm through the physical experiment, and directly gets the key with the SPA. The result indicates that attacking RSA encrypted systems without some extra protective measures SPA is quite easy and efficient. Finally, the design of RSA encrypt scheme and its provable security were discussed.
出处 《微计算机信息》 2009年第12期69-70,65,共3页 Control & Automation
基金 基金申请人:赵强 项目名称:集成电路芯片电磁泄露旁路攻击机理及解密研究 基金颁发部门:国家自然科学基金委(60571037)
关键词 RSA 密码芯片 简单功耗分析(SPA) 可证安全性 RSA cipher chip Simple Power Analysis (SPA) provable security
  • 相关文献

参考文献6

二级参考文献39

  • 1施向东,董平.基于RSA算法的一种新的加密核设计[J].微计算机信息,2005,21(12X):39-41. 被引量:12
  • 2Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14. 被引量:1
  • 3Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415. 被引量:1
  • 4Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001. 被引量:1
  • 5Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139. 被引量:1
  • 6Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25. 被引量:1
  • 7Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999. 被引量:1
  • 8Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536. 被引量:1
  • 9Burrows M, Abadi M, Needham R. A logic for authentication. ACM Trans. on Computer Systems, 1990,8(1):18-36. 被引量:1
  • 10Bellare M, Rogaway P. Entity authentication and key exchange. In: Stinson D.R, ed. Proc. of the Advances in CryptologyCrypto'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993. 232-249. 被引量:1

共引文献124

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部