基于错误检验故障的RSA-CRT差分故障分析  

Differential Fault Analysis on RSA-CRT Based on Fault in Error Checking Operation

在线阅读下载全文

作  者:陈财森[1] 王韬[1] 田军舰[1] 张金中[1] 

机构地区:[1]军械工程学院计算机工程系,石家庄050003

出  处:《计算机科学》2011年第3期76-79,共4页Computer Science

基  金:国家自然科学基金(60772082);河北省自然科学基金(08M010)资助

摘  要:原有基于模幂运算故障的RSA-CRT故障攻击算法,因添加了错误检验操作而失效。为寻找新的故障攻击方法,以BOS防御算法为攻击分析对象,针对在检错步骤产生故障的情况进行分析,建立了基于错误检验故障的攻击模型,提出了能够完整推算出RSA密钥的差分故障攻击算法。进行了推导论证和实验仿真,结果表明原有防御措施并不能有效地抵御故障攻击,新的攻击算法具有良好的可行性,在算法复杂度上,比Wagner的攻击算法需要更少的搜索空间,单个字节故障最多只需要256个样本空间。最后分析了原有防御算法的问题所在,同时给出了相应的防御建议。The former fault analysis can't attack on RSA-CRT with corresponding countermeasure.In order to find the new vulnerability to fault analysis,this paper took BOS countermeasure as the analyzed object.An attack model based on fault in error checking operation was advanced,and a differential fault analysis algorithm was given that can completely recover the RSA key.The fact that the previous countermeasures can't effectively resist the differential fault analysis was demonstrated,and the complexity of our attack was estimated both by a theoretical analysis and software simulations.Experiment results show that the new fault analysis algorithm has well feasibility,it requires less faulty signature samples than Wagner's attack algorithm,almost need 256 samples for single byte fault.Finally,a correspon-ding advice on countermea-sure to differential fault analysis was given by analyzing the problem of previous countermeasures.

关 键 词:旁路攻击 故障模型 差分故障分析 错误检验 中国剩余定理 RSA密码算法 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象