期刊文献+

可信平台中抗侧信道攻击的RSA算法改进研究

Improvement of RSA algorithm to resist side-channel attacks in TPM
下载PDF
导出
摘要 可信计算是信息安全领域研究的热点,研究可信平台模块的安全性具有重要意义。可信平台模块传统RSA加密算法缺少物理保护,具有受到侧信道攻击的风险。根据抵抗侧信道攻击的传统RSA算法,提出了一种改进方法,将RSA添加伪随机数操作方案改进为在遇到0 b时通过0,1随机数判断是否执行伪随机操作,减少了模乘运算量。研究表明,在保证安全性的前提下,改进的RSA算法可提高模块计算效率。 The trusted computing is a research hotspot in the field of information security, and the study of the trusted plat- form module (TPM) security has the great significance. The traditional RSA encryption algorithm of TPM lacks of physical pro- tection, and has the risk of side-channel attacks. According to the traditional RSA algorithm to resist the side-channel attacks, an improved method is put forward. The scheme of adding pseudo-random number operation into RSA is improved to determine whether executing pseudo-random operation with 0 and 1 random numbers while encountering a 0 b, so as to reduce the modu- lar multiply operation. The research shows that the improved RSA algorithm can improve the module calculation efficiency while guaranteeing the security.
出处 《现代电子技术》 北大核心 2016年第19期67-70,75,共5页 Modern Electronics Technique
基金 国家自然科学基金资助项目(61103231 61103230) 陕西省自然科学基金资助项目(2012JM8014)
关键词 可信平台模块 RSA 侧信道攻击 伪随机操作 trusted platform model RSA side-channel attack pseudo-random operation
  • 相关文献

参考文献10

二级参考文献54

  • 1饶金涛,陈运,吴震,陈俊,许森.一种抗简单功耗分析攻击的模幂算法[J].成都信息工程学院学报,2011,26(2):123-126. 被引量:2
  • 2韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 3KOCHER C. Timing attacks on implementations of Diffie- Hellman, RSA , DSS, and other systems [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 96), Springer-Verlag, 1997 : 104 - 113. 被引量:1
  • 4KOCHER C, JAFFE J, JUN B. Differential power analysis [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 99), Springer- Verlag, 1999 : 388 - 397. 被引量:1
  • 5MONTGOMERY P L. Speeding the Pollard and elliptic curve methods of factorization [ J ]. Mathematics of Computation, 1987, 48 (177) : 243 - 264. 被引量:1
  • 6MESSERGES T S. DABBISH E A, SLOAN R H. , Power analysis atta-cks of modular exponentiation in smartcards [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 99 ), Springer-Verlag, 2000 : 144 - 157. 被引量:1
  • 7MESSERGES T S. Power analysis attacks and countermeasures for cryptographic algorithms [ D ]. Chicago:Graduate College of the University of Illionois, 2000. 被引量:1
  • 8WALTER C. Sliding windows succumbs to big mac attack [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems( CHES'01 ), Springer- Verlag, 2001:286 - 299. 被引量:1
  • 9VLASTIMILI K, TOMAS R, Futher results and considerations on side channel attacks on RSA [ C]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 02 ), Springer-Verlag, 2002 : 244 - 259. 被引量:1
  • 10CORON J S. Resistance against differential power analysis for elliptic curve cryptosystems [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( C HES' 99 ). Springer-Verlag, 1999:292 - 302. 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部