【24h】

Resistance of Randomized Projective Coordinates Against Power Analysis

机译:随机投影坐标系对功效分析的抵抗力

获取原文
获取原文并翻译 | 示例

摘要

Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms used, one of the most serious threats against secret data stored in such devices is Side Channel Analysis. Implementing Public Key Cryptography in low-profile devices such as smart cards is particularly challenging given the computational complexity of the operations involved. In the area of elliptic curve cryptography, some choices of curves and coefficient fields are known to speed up computations, like scalar multiplication. Prom a theoretical standpoint, the use of optimized structures does not seem to weaken the cryptosystems which use them. Therefore several standardization bodies, such as the NIST, recommend such choices of parameters. However, the study of their impact on practical security of implementations may have been underestimated. In this paper, we present a new chosen-ciphertext Side-Channel Attack on scalar multiplication that applies when optimized parameters, like NIST curves, are used together with some classical anti-SPA and anti-DPA techniques. For a typical exponent size, the attack allows to recover a secret exponent by performing only a few hundred adaptive power measurements.
机译:实现密码服务的嵌入式设备是成本,性能和安全性之间权衡的结果。除了协议和所使用算法的缺陷外,针对此类设备中存储的秘密数据的最严重威胁之一是“边信道分析”。考虑到所涉及操作的计算复杂性,在诸如智能卡之类的低调设备中实施公钥加密特别具有挑战性。在椭圆曲线密码学领域,已知一些曲线和系数字段的选择可以加快计算速度,例如标量乘法。从理论上讲,优化结构的使用似乎并没有削弱使用它们的密码系统。因此,一些标准化机构(例如NIST)推荐这样的参数选择。但是,对它们对实施的实际安全性的影响的研究可能被低估了。在本文中,我们提出了一种针对标量乘法的新的选定密文侧信道攻击,当将优化参数(例如NIST曲线)与一些经典的anti-SPA和anti-DPA技术一起使用时,将适用于此。对于典型的指数大小,攻击仅通过执行数百次自适应功率测量即可恢复秘密指数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号