首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种抗简单功耗分析攻击的模幂算法
引用本文:饶金涛,陈运,吴震,陈俊,许森.一种抗简单功耗分析攻击的模幂算法[J].成都信息工程学院学报,2011(4):123-126.
作者姓名:饶金涛  陈运  吴震  陈俊  许森
作者单位:成都信息工程学院信息安全研究所,四川成都610225
基金项目:国家自然科学基金资助项目(60873216);四川省科技支撑计划重点项目(2011GZ0170)
摘    要:在真实环境下对智能卡RSA算法进行了功耗采集,通过简单功耗分析攻击(SPA)提取出了密钥,证明了传统的模幂运算二元表示(BinaryRepresentation,BR)算法存在明显的密钥信息泄露缺陷。分析发现,信息泄露发生在程序的跳转分支处。针对这一缺陷,提出了一种原子化操作与引入随机数相结合的模幂算法。通过操作的原子化统一了模幂算法的执行路径,消除因跳转分支引起的信息泄露;引入随机数对密钥的汉明重量进行掩盖,有效地防止密钥信息的泄露。在MC8051上的实测验证表明,新算法确实具有抗简单功耗分析的特性。

关 键 词:信息安全  边信道攻防  简单功耗分析  原子化操作  随机数

A Countermeasure to Simple Power Analysis for Modular Exponentiation
RAO Jin-tao,CHEN Yun,WU Zhen,CHEN Jun,XU Sen.A Countermeasure to Simple Power Analysis for Modular Exponentiation[J].Journal of Chengdu University of Information Technology,2011(4):123-126.
Authors:RAO Jin-tao  CHEN Yun  WU Zhen  CHEN Jun  XU Sen
Institution:(Information Security Institute, Chengdu University of Information Technology,Chengdu,610225)
Abstract:The effect power of the running Smart card with RSA algorithm was collected to extract the Key by Simple Power Analysis Attaching (SPA). That shows there existing obvious information leak defect of the traditional modular exponentiation Binary Representation. Information leak happened to the program branches from our research. A novel algorithm combining atomic operation with random number was presented to avoid prescribed problem. The operate path of modular exponentiation was unify and the Hamming Weight of the key was masked using random number with this algorithm so as not to exposure to the adventure of information leak. Experiments were done in MC8051. The results show that the algorithm is well resistance to SPA.
Keywords:information security  side-channel attack and defense  SPA  atomic operation random number
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号