首页> 外文会议>Information security applications. >Generalized Security Analysis of the Random Key Bits Leakage Attack
【24h】

Generalized Security Analysis of the Random Key Bits Leakage Attack

机译:随机密钥泄漏攻击的广义安全性分析

获取原文
获取原文并翻译 | 示例

摘要

In CRYPTO 2009, Heninger and Shacham presented a new method of recovering RSA private keys bit by bit given a fraction of private data, and analyzed resistance of RSA against the attack. They obtained a system of relations between RSA private variables and cal culated the expected number of solution candidates. As they dealt with only RSA case, we consider the case that the system of equations is given in more general linear form. We show that the complexity of their at tack depends only on the number of variables, the number of ambiguous variables, and the degree of freedom. As concrete examples, we apply the attack to Paillier cryptosystem and Takagi's variant of RSA, and analyze their resistance against the attack. In Pailiier's case, its resistance is al most the same as the case when a fraction of three private RSA keys are leaked. In Takagi's case, we find that the asymmetricity in two factors of the modulus give some effects on the resistance against the attack.
机译:在CRYPTO 2009中,Heninger和Shacham提出了一种在给定一部分私有数据的情况下一点一点地恢复RSA私钥的新方法,并分析了RSA对攻击的抵抗力。他们获得了RSA私有变量之间的关系系统,并计算了预期的候选解决方案数量。由于它们仅处理RSA情况,因此我们考虑以更通用的线性形式给出方程组的情况。我们证明了它们的粘性仅取决于变量的数量,模棱两可的变量的数量以及自由度。作为具体示例,我们将攻击应用于Paillier密码系统和Takagi的RSA变体,并分析其对攻击的抵抗力。在Pailiier的情况下,它的抵抗力几乎与三个私有RSA密钥的一部分泄漏时的抵抗力相同。在高木的情况下,我们发现模量的两个因素中的不对称性对抵抗攻击具有一定的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号