摘要
<正>Dear editor,In the field of side-channel attacks (SCAs), the security of both block ciphers and public key cryptosystems is widely studied after the seminal differential power analysis (DPA)[1]. The straightforward implementations of both types of cryptographic algorithms are vulnerable to SCAs. The former attack methods are based on a compari-
引文
1 Kocher P C,Jaffe J,Jun B.Differential power analysis.In:Proceedings of Annual International Cryptology Conference,Santa Barbara,1999.15-19
2 Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model.In:Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems,Cambridge,2004.16-29
3 Boscher A,Naciri R,Prouff E.CRT RSA algorithm protected against fault attack.In:Proceedings of International Conference on Information Security Theory and Practices,Heraklion,2007.229-243
4 Boscher A,Handschuh H,Trichina E.Blinded fault resistant exponentiation revisited.In:Proceedings of Fault Diagnosis and Tolerance in Cryptography,Lausanne,2010
5 Clavier C,Reynaud L.Improved blind side-channel analysis by exploitation of joint distributions of leakages.In:Proceedings of International Conference on Cryptographic Hardware and Embedded Systems,Taipei,2017.24-44
6 Xu S,Lu X J,Zhang K Y,et al.Similar operation template attack on RSA-CRT as a case study.Sci China Inf Sci,2018,61:032111
7 Giraud C.An RSA implementation resistant to fault attacks and to simple power analysis.IEEE Trans Comput,2006,55:1116-1120
8 Kiss′A,Kr¨amer J,Rauzy P.Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT.In:Proceedings of Constructive Side-Channel Analysis and Secure Design,Graz,2016.111-129
9 Kim S K,Kim T H,Han D G,et al.An efficient CRT-RSA algorithm secure against power and fault attacks.J Syst Softw,2011,84:1660-1669