期刊文献+

针对DSA滑动窗口算法实现的指令Cache计时攻击

Instruction Cache Timing Attack on DSA Adopting Slide Window Algorithm
下载PDF
导出
摘要 在现有的针对RSA等公钥密码的指令Cache计时攻击的研究基础上,提出了一套可行的针对DSA的指令Cache计时攻击方法,并对计时信息采集、识别、密钥恢复等环节进行了研究,给出了一种随机密钥恢复算法。搭建了攻击实验平台,利用编写的间谍程序对滑动窗口算法实现的DSA签名进行了实际攻击,验证了指令Cache计时攻击方法是可行、有效的. Digital signature algorithm (DSA) is one of the wildly used signature algorithms. Based on present work on RSA and other public key cryptography, a feasible method for instruction Cache timing attack on DSA is proposed. Some key technologies like timing information gaining and identifying, and key recovering are investigated and an algorithm for key recovering is pro- posed. This paper also builds an attack platform and launches an attack on slide window method DSA via the spy program. The results demonstrate the feasibility and effectiveness of the method.
出处 《军械工程学院学报》 2013年第2期56-60,共5页 Journal of Ordnance Engineering College
关键词 DSA 数字签名 指令Cache计时攻击 旁路攻击 DSA digital signature Instruction-Cache timing attack side channel attack
  • 相关文献

参考文献10

  • 1KOCHER P C. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems[C//Pro- ceedings of CRYPTO 96. Heidelberg= Springer Berlin, 1996=104-113. 被引量:1
  • 2PAGE D. Theoretical use of Cache memory as a crypta- nalytic side-channel[R. Bristol= University of Bristol, 2002:328-336. 被引量:1
  • 3PERCIVAL C. Cache missing for fun and profit EEB/ OLd. [2012-10-12]. http://www, daemonology, net/pa- pers/htt, pdf. 被引量:1
  • 4ACIICMEZ O. Yet another micro-architectural attack: exploiting I-cache[C]//Proceedings of ACM CCS' 07. New York : ACM Press, 2007 : 11-18. 被引量:1
  • 5ACIIq;MEZ O,BRUMLEY B B, GRABHER P. New re- sults on instruction Cache attacks[C//Proceedings of ASIACRYPT 2009. Heidelberg: Springer Berlin, 2009: 667 684. 被引量:1
  • 6MENEZES J A,OORSCHOT C P,VANSTONE A S.应用密码学手册[M].北京:电子工业出版社,2005:454-455. 被引量:1
  • 7KNUTH D E. The art of computer programmingEM. Massachusetts : Addison-Wesley, 1981 : 188-190. 被引量:1
  • 8KOC C. Analysis of sliding window techniques for expo nentiationJ. Computers and Mathematics with Appli- cation, 1995,30(10) : 17-24. 被引量:1
  • 9BRUMLEY B B, HAKALA R M. Cache-timing template attacksVC//Proceedings of ASIACRYPT 2009. Heidel berg : Springer Berlin, 2009 : 667-685. 被引量:1
  • 10LEADBITTER P J, PAGE D, Smart N P. Attacking DSA under a repeated bits assumptionEC//Proceedings of CHES 2004. Heidelberg: Springer Berlin, 2004: 141- 190. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部