期刊文献+

针对滑动窗口算法的椭圆曲线密码Cache计时攻击

Cache-Timing Attack on with Sliding Elliptic Curve Cryptosystems Window Method
下载PDF
导出
摘要 基于访问驱动攻击模型,提出一种针对椭圆曲线滑动窗口算法的踪迹驱动Cache计时攻击方法,引入了方差思想判断每次窗口滑动是否查找了预计算表,提高了攻击成功率.仿真实验结果表踞:由于滑动窗口算法引入了预计算表,易遭受Cache计时攻击.精确采集NITT-192一次加密过程中窗口105次滑动的Cache时间信息即可获取完整密钥.本文的攻击方法对其他使用预计算表的公钥密码具有借鉴意义. This paper proposes a trace driven Cache timing attack on sliding window algorithmic based on the model of trace driven attack, and introduces the variance to judge whether window sliding has accessed pre-compute table. It enhances the success rate of attack. The experiment results demonstrate that sliding window algorithmic is susceptible to Cache timing attack because of pre-compute table. Full NIST-192 bits key can be recovered by collecting 105 times window sliding in encrypting only once. The method presented here can provide some ideas for Cache tim- ing attack on other public cryptosystems using sliding window method.
出处 《军械工程学院学报》 2012年第3期41-45,共5页 Journal of Ordnance Engineering College
基金 国家自然科学基金资助项目(60772082) 河北省自然科学基金数学研究专项资助项目(08M010)
关键词 CACHE计时攻击 踪迹驱动 椭圆曲线密码 滑动窗口算法 预计算表 Cache-Timing attack trace driven elliptic curve cryptosystems sliding window algo- rithmic pre-compute table
  • 相关文献

参考文献8

  • 1KOCHER P C. Timing attacks on implementations of Diffie-H ellman,RSA,DSS,and other systems[A].London:Springer-Verlag,1996.104-113. 被引量:1
  • 2ACIICMEZ O. Yet another micro-architectural attack:exploiting I-cache[A].New York:IEEE Press,2007.11-18. 被引量:1
  • 3OSVIK D A,SHAMIR A,TROMER E. Cache attacks and countermeasures:the case of AES[A].Beilin:Springer-Verlag,2006.1-25. 被引量:1
  • 4BONNEAU J,MIRONOV I. Cache-collision timing at tacks against AES[A].Beilin:Springer-Verlag,2006.201-215. 被引量:1
  • 5PERCIVAL C. Cache missing for fun and profit[EB/OL].http://www.daemonology.net/hyper threading-considered-harmful,2005. 被引量:1
  • 6ACIICMEZ O,KOC C K. Trace-Driven Cache attacks on AES[A].Beilin:Springer-Verlag,2006.112-121. 被引量:1
  • 7BRUMLEY B B,HAKALA R M. Cache-Timing template attacks[A].Tokyo:Springer,2009.667-684. 被引量:1
  • 8BRUMLEY B B,TUVERI N. Remote timing attacks are still practical[EB/OL].http://eprint.iacr.org/2011/232,2011. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部