用户名: 密码: 验证码:
Side channel attack of multiplication in GF(q) –application to secure RSA-CRT
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Side channel attack of multiplication in GF(q) –application to secure RSA-CRT
  • 作者:Sen ; XU ; Weija ; WANG ; Xiangjun ; LU ; Zheng ; GUO ; Junrong ; LIU ; Dawu ; GU
  • 英文作者:Sen XU;Weija WANG;Xiangjun LU;Zheng GUO;Junrong LIU;Dawu GU;Department of Computer Science and Engineering, Shanghai Jiao Tong University;Shanghai Institute for Advanced Communication and Data Science;
  • 中文刊名:JFXG
  • 英文刊名:中国科学:信息科学(英文版)
  • 机构:Department of Computer Science and Engineering, Shanghai Jiao Tong University;Shanghai Institute for Advanced Communication and Data Science;
  • 出版日期:2018-10-24 08:41
  • 出版单位:Science China(Information Sciences)
  • 年:2019
  • 期:v.62
  • 基金:supported by National Natural Science Foundation of China (Grant Nos. U1536103, 61402286, 61472249, 61602239, 61572192, 61472250);; Minhang District Cooperation Plan (Grant No. 2016MH310)
  • 语种:英文;
  • 页:JFXG201903019
  • 页数:3
  • CN:03
  • ISSN:11-5847/TP
  • 分类号:202-204
摘要
<正>Dear editor,In the field of side-channel attacks (SCAs), the security of both block ciphers and public key cryptosystems is widely studied after the seminal differential power analysis (DPA)[1]. The straightforward implementations of both types of cryptographic algorithms are vulnerable to SCAs. The former attack methods are based on a compari-
        
引文
1 Kocher P C,Jaffe J,Jun B.Differential power analysis.In:Proceedings of Annual International Cryptology Conference,Santa Barbara,1999.15-19
    2 Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model.In:Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems,Cambridge,2004.16-29
    3 Boscher A,Naciri R,Prouff E.CRT RSA algorithm protected against fault attack.In:Proceedings of International Conference on Information Security Theory and Practices,Heraklion,2007.229-243
    4 Boscher A,Handschuh H,Trichina E.Blinded fault resistant exponentiation revisited.In:Proceedings of Fault Diagnosis and Tolerance in Cryptography,Lausanne,2010
    5 Clavier C,Reynaud L.Improved blind side-channel analysis by exploitation of joint distributions of leakages.In:Proceedings of International Conference on Cryptographic Hardware and Embedded Systems,Taipei,2017.24-44
    6 Xu S,Lu X J,Zhang K Y,et al.Similar operation template attack on RSA-CRT as a case study.Sci China Inf Sci,2018,61:032111
    7 Giraud C.An RSA implementation resistant to fault attacks and to simple power analysis.IEEE Trans Comput,2006,55:1116-1120
    8 Kiss′A,Kr¨amer J,Rauzy P.Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT.In:Proceedings of Constructive Side-Channel Analysis and Secure Design,Graz,2016.111-129
    9 Kim S K,Kim T H,Han D G,et al.An efficient CRT-RSA algorithm secure against power and fault attacks.J Syst Softw,2011,84:1660-1669

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700