【24h】

Energy Exhaustion Attack on Barrett's Reduction

机译:能量消耗攻击对巴雷特的减排

获取原文
获取原文并翻译 | 示例

摘要

Modular reduction is an integral part of the underlying computation in several cryptographic systems. This paper identifies a potential vulnerability in one of the most well-known reduction algorithms, namely Barrett's reduction algorithm. The vulnerability lies in the algorithm's while loop which is usually unbounded in straightforward implementation. An adversary can exploit the vulnerability by tampering with the sign flag of the processor's status register. Our work reveals that attacks exploiting such weaknesses can cause a huge amount of completely unnecessary arithmetic operations, rapidly draining energy from a cryptographic device that implements this reduction. Devices running on batteries, for example laptops and smart phones, will lose energy completely when faced with such attacks. This kind of consequences might also result if the sign flag becomes faulty due to natural causes such as voltage glitches or exposure to radiations. Countermeasures for the aforementioned vulnerability are also discussed in this paper.
机译:模块化归约是一些密码系统中基础计算的组成部分。本文确定了一种最著名的归约算法(即Barrett的归约算法)中的潜在漏洞。该漏洞位于算法的while循环中,通常在直接实现中不受限制。攻击者可以通过篡改处理器状态寄存器的符号标志来利用此漏洞。我们的工作表明,利用这种弱点的攻击可能会导致大量完全不必要的算术运算,从而迅速从实现这种减少的加密设备中消耗能量。用电池供电的设备(例如笔记本电脑和智能手机)在遭受此类攻击时将完全失去能量。如果由于自然原因(例如电压毛刺或暴露于辐射)导致符号标志出现故障,也可能导致这种后果。本文还讨论了针对上述漏洞的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号