首页> 外文会议>Applied Cryptography and Network Security >Security Analysis of CRT-Based Cryptosystems
【24h】

Security Analysis of CRT-Based Cryptosystems

机译:基于CRT的密码系统的安全性分析

获取原文

摘要

We investigate the security of several cryptosystems based on the Chinese remainder theorem (CRT) against side channel attack (SCA). Novak first proposed a simple power analysis against the CRT part using the difference of message modulo p and modulo q. In this paper we apply Novak's attack to the other CRT-based cryptosystems, namely Multi-Prime RSA, Multi-Exponent RSA, Rabin cryptosystem, and HIME(R) cryptosystem. Novak-type attack is strictly depending how to implement the CRT. We examine the operations related to CRT of these cryptosystems, and show that an extended Novak-type attack is effective on them. Moreover, we present a novel attack called zero-multiplication attack. The attacker tries to guess the secret prime by producing ciphertexts that cause a multiplication with zero during the decryption, which is easily able to be detected by power analysis. We examine the zero-multiplication attack on the above cryptosystems. Finally, we propose countermeasures against these attacks. The proposed countermeasures are based on the ciphertext blinding, but they require no inversion operation. The overhead of the proposed scheme is only about 1% to 5% of the whole decryption.
机译:我们研究了基于中文余数定理(CRT)的针对旁通道攻击(SCA)的几种密码系统的安全性。 Novak首先使用消息模p和模q的差提出了针对CRT部件的简单功率分析。在本文中,我们将Novak的攻击应用于其他基于CRT的密码系统,即Multi-Prime RSA,Multi-Exponent RSA,Rabin密码系统和HIME(R)密码系统。 Novak型攻击严格取决于如何实施CRT。我们检查了与这些密码系统的CRT相关的操作,并证明了扩展的Novak型攻击对其有效。此外,我们提出了一种新颖的攻击,称为零乘法攻击。攻击者试图通过产生密文来猜测秘密素数,该密文在解密过程中导致零乘法运算,而幂分析很容易检测出该密文。我们研究了对上述密码系统的零乘法攻击。最后,我们提出了针对这些攻击的对策。所提出的对策基于密文盲法,但是它们不需要反演操作。所提出的方案的开销仅为整个解密的约1%至5%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号