首页 | 本学科首页   官方微博 | 高级检索  
     

RSA算法时序模板SDPA攻击研究
引用本文:许森,陈运,陈俊,饶金涛,孙敦灿. RSA算法时序模板SDPA攻击研究[J]. 成都信息工程学院学报, 2011, 26(3): 323-328
作者姓名:许森  陈运  陈俊  饶金涛  孙敦灿
作者单位:成都信息工程学院信息安全研究所,四川成都,610225
基金项目:国家自然科学基金资助项目(60873216);四川省科技支撑计划重点资助项目(2011GZ0170)
摘    要:通过对8051芯片(支持ISO7816协议)上RSA算法功耗曲线进行大量测试观察,发现传统模幂运算二元表示算法分支语句存在指数信息的泄露。针对这一缺陷,首先尝试基于分支语句时间序列的先验模板攻击方法,实验表明传统的先验模板准确率只有85%左右。通过对匹配错误数据的深入分析,发现传统先验模板攻击的局限性,继而提出了基于SDPA时序模板攻击方法。新方法模拟真实待测环境构建模板,消除了先验模板攻击中因指数不同造成的相同模板间的差异,有效地提高了攻击的准确性。实验验证新方法的攻击正确率达到100%。

关 键 词:信息安全  边信道攻防  模板攻击  SDPA

A SDPA Attack Research based on Time Sequence Template in RSA
XU Sen , CHEN Yun , CHEN Jun , RAO Jin-tao , SUN Dun-can. A SDPA Attack Research based on Time Sequence Template in RSA[J]. Journal of Chengdu University of Information Technology, 2011, 26(3): 323-328
Authors:XU Sen    CHEN Yun    CHEN Jun    RAO Jin-tao    SUN Dun-can
Affiliation:(Information Security Institute,Chengdu University of Information Technology,Chengdu,610225,China)
Abstract:Testing results about power traces of RSA algorithm on 8051 chip with ISO 7816 protocol show that the traditional modular exponentiation Binary Representation method has the information leakage defect when the branch execution. Then, we tried the prior template attack method based on sequential branch execution to achieve the at- tack success rate to 85 %. After carefully analyzed the mismatch data, we represented the new SDPA based sequential template attack method. The new method accurately simulates the target circumstance template and eliminates the differences induced by templates' prior factors chosen. The experimental results show the SDPA method can make the attack 100% successful.
Keywords:information security  side channel attack  template attack  SDPA
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号