首页> 外文会议>Constructive side-channel analysis and secure design. >Attacking Exponent Blinding in RSA without CRT
【24h】

Attacking Exponent Blinding in RSA without CRT

机译:在没有CRT的情况下攻击RSA中的指数致盲

获取原文
获取原文并翻译 | 示例

摘要

A standard SPA protection for RSA implementations is exponent blinding (see [7]). Fouque et al., [4] and more recently Schindler and Itoh, [8] have described side-channel attacks against such implementations. The attack in [4] requires that the attacker knows some bits of the blinded exponent with certainty. The attack methods of [8] can be defeated by choosing a sufficiently large blinding factor (about 64 bit). In this paper we start from a more realistic model for the information an attacker can obtain by simple power analysis (SPA) than the one that forms the base of the attack in [4]. We show how the methods of [4] can be extended to work in this setting. This new attack works, under certain restrictions, even for long blinding factors (i.e. 64 bit or more).
机译:RSA实现的标准SPA保护是指数盲法(请参阅[7])。 Fouque等人[4]以及最近的Schindler和Itoh [8]已经描述了针对此类实现的侧信道攻击。 [4]中的攻击要求攻击者确定地知道盲指数的一些位。通过选择足够大的盲因子(大约64位)可以击败[8]的攻击方法。与[4]中构成攻击基础的模型相比,本文从更现实的模型出发,针对攻击者可以通过简单的功率分析(SPA)获得的信息。我们展示了如何扩展[4]的方法以在此设置下工作。即使在长时间的盲目因素(即64位或更多)下,这种新的攻击也可以在一定的限制下起作用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号