首页> 外文会议>International conference on cryptology in India >Correlation Analysis against Protected SFM Implementations of RSA
【24h】

Correlation Analysis against Protected SFM Implementations of RSA

机译:RSA的受保护SFM实现的相关性分析

获取原文

摘要

Since Kocher's first attacks in 1996, the field of side-channel analysis has widely developed, and new statistical tools have competed against new countermeasures to threaten cryptosystems. Among existing algorithms, RSA has always been a privileged target. It seems generally admitted that a combination of SPA protection such as regular exponentiation associated with blinding techniques such as randomization of the exponent and of the input message offers in practice sufficient protection against all known side-channel attacks. Indeed, known attacks either require building statistical information over several executions of the algorithm, which is countered by exponent randomization, or rely on partial SPA leakage, which implies an incorrect implementation of known countermeasures, or require specific internal knowledge of the implementation and hard-to-obtain experimental conditions, as for the recent horizontal correlation analysis of Clavier et al. [10]. In this paper, we show that it is possible to attack a state-of-the-art implementation of Straightforward Method (SFM) RSA. Our attack requires a small public exponent (no greater than 2~(16) + 1) and a reasonable exponent blinding factor (no greater than 32 bits). It does not require additional internal knowledge of the implementation, neither does it have special experimental requirements. From a practical point of view, it thus compares with classical correlation analysis. We provide simulations of our attack demonstrating its efficiency, even in noisy scenarios. This shows that SFM implementations of RSA may be much more difficult to protect against side-channel attacks than CRT implementations.
机译:自从Kocher在1996年首次发动攻击以来,边信道分析领域得到了广泛的发展,新的统计工具已经与威胁密码系统的新反制竞争。在现有算法中,RSA一直是特权目标。似乎普遍认为,SPA保护(例如与盲法技术(例如指数和输入消息的随机化)相关联的规则幂运算)的组合在实践中提供了针对所有已知侧信道攻击的足够保护。确实,已知攻击要么需要通过算法的多次执行来建立统计信息(通过指数随机化来抵消),要么依赖于SPA的部分泄漏(这意味着已知对策的实施有误),或者需要对实施有特定的内部了解并且很难以获得实验条件,如Clavier等人最近的水平相关分析。 [10]。在本文中,我们表明可以攻击简单方法(SFM)RSA的最新实现。我们的攻击需要一个小的公共指数(不大于2〜(16)+1)和一个合理的指数致盲因子(不大于32位)。它不需要实施的其他内部知识,也没有特殊的实验要求。因此,从实用的角度来看,它可以与经典的相关分析进行比较。我们提供了模拟攻击的方法,即使在嘈杂的情况下也能证明其效率。这表明,与CRT实施相比,RSA的SFM实施可能难以防御侧信道攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号