检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈财森[1] 王韬[1] 田军舰[1] 张金中[1]
机构地区:[1]军械工程学院计算机工程系,石家庄050003
出 处:《计算机科学》2011年第3期76-79,共4页Computer Science
基 金:国家自然科学基金(60772082);河北省自然科学基金(08M010)资助
摘 要:原有基于模幂运算故障的RSA-CRT故障攻击算法,因添加了错误检验操作而失效。为寻找新的故障攻击方法,以BOS防御算法为攻击分析对象,针对在检错步骤产生故障的情况进行分析,建立了基于错误检验故障的攻击模型,提出了能够完整推算出RSA密钥的差分故障攻击算法。进行了推导论证和实验仿真,结果表明原有防御措施并不能有效地抵御故障攻击,新的攻击算法具有良好的可行性,在算法复杂度上,比Wagner的攻击算法需要更少的搜索空间,单个字节故障最多只需要256个样本空间。最后分析了原有防御算法的问题所在,同时给出了相应的防御建议。The former fault analysis can't attack on RSA-CRT with corresponding countermeasure.In order to find the new vulnerability to fault analysis,this paper took BOS countermeasure as the analyzed object.An attack model based on fault in error checking operation was advanced,and a differential fault analysis algorithm was given that can completely recover the RSA key.The fact that the previous countermeasures can't effectively resist the differential fault analysis was demonstrated,and the complexity of our attack was estimated both by a theoretical analysis and software simulations.Experiment results show that the new fault analysis algorithm has well feasibility,it requires less faulty signature samples than Wagner's attack algorithm,almost need 256 samples for single byte fault.Finally,a correspon-ding advice on countermea-sure to differential fault analysis was given by analyzing the problem of previous countermeasures.
关 键 词:旁路攻击 故障模型 差分故障分析 错误检验 中国剩余定理 RSA密码算法
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.148.241.210