首页> 外文会议>Australasian conference on information security and privacy >Further Research on N-1 Attack against Exponentiation Algorithms
【24h】

Further Research on N-1 Attack against Exponentiation Algorithms

机译:N-1攻击指数算法的进一步研究

获取原文

摘要

In 2005, Yen et al. firstly proposed the N - 1 attack against cryptosystems implemented based on BRIP and square-multiply-always algorithms. This attack uses the input message N - 1 to obtain relevant side-channel information from the attacked cryptosystem. In this paper we conduct an in-depth study on the N - 1 attack and find that two more special values taken as the input message also can be exploited by an attacker. According to this, we present our chosen-message attack against Boscher's right-to-left exponentiation algorithm which is a side-channel resistant exponentiation algorithm. Furthermore, immunity of the Montgomery Powering Ladder against the N - 1 attack is investigated. The result is that the Montgomery Powering Ladder is subjected to the N - 1 attack. But a different approach to retrieve the key is used which derives from the relative doubling attack. To validate our ideas, we implement the two algorithms in hardware and carry out the attacks on them. The experiment results show that our attacks are powerful attacks against these two algorithms and can be easily implemented with one power consumption curve.
机译:2005年,Yen等人。首先提出了对基于BRIP和总是乘方算法的密码系统的N-1攻击。该攻击使用输入消息N-1从被攻击的密码系统获取相关的边信道信息。在本文中,我们对N-1攻击进行了深入研究,发现攻击者还可以利用另外两个特殊值作为输入消息。据此,我们提出了针对Boscher的从右到左幂运算算法的选择消息攻击,该算法是一种抗边通道的幂运算算法。此外,研究了蒙哥马利动力梯队对N-1攻击的免疫力。结果是蒙哥马利动力梯遭受了N-1攻击。但是,使用了另一种方法来检索密钥,该方法是从相对加倍攻击中得出的。为了验证我们的想法,我们在硬件中实现了这两种算法并对其进行了攻击。实验结果表明,我们的攻击是针对这两种算法的强大攻击,并且可以通过一条功耗曲线轻松实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号