首页> 外文期刊>Computers, IEEE Transactions on >Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack
【24h】

Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack

机译:基于同态属性的RSA并行错误检测:故障攻击的对策

获取原文
获取原文并翻译 | 示例

摘要

Fault-based attacks, which recover secret keys by deliberately introducing fault(s) in cipher implementations and analyzing the faulty outputs, have been proved to be extremely powerful. In this paper, we propose a novel Concurrent Error Detection (CED) scheme to counter fault-based attack against RSA by exploiting its multiplicative homomorphic property. Specifically, the proposed CED scheme verifies if Pi _{i = 1}^k E(m_i ) equiv E(Pi _{i = 1}^k m_i bmod n) (bmod n) where E could be either RSA encryption, or decryption, or signature, or verification process. Upon a mismatch, all the ciphertexts will be suppressed. The time overhead is 1/k and k can be used to trade-off the time overhead with memory overhead and output latency. Recognizing that an RSA device could be subject to a combination of several side-channel attacks, the proposed scheme enables an easy divide-and-concur solutionȁ4;any fine-tuned architecture, for example, a power-attack-resistant architecture, can be equipped with fault-attack resistance easily without disturbing its original resistance. This advantage distinguishes the proposed scheme over the existing countermeasures.
机译:基于故障的攻击已证明是非常强大的,它通过在密码实现中故意引入错误并分析错误的输出来恢复密钥。在本文中,我们提出了一种新颖的并发错误检测(CED)方案,通过利用其乘态同态性质来对抗基于故障的RSA攻击。具体而言,建议的CED方案验证Pi _ {i = 1} ^ k E(m_i)是否等于E(Pi _ {i = 1} ^ k m_i bmod n)(bmod n),其中E可以是RSA加密,也可以是解密,签名或验证过程。一旦不匹配,所有密文将被抑制。时间开销为1 / k,k可用于权衡时间开销与内存开销和输出延迟。认识到RSA设备可能会受到多种侧信道攻击的影响,因此该方案可实现简单的“分而兼并”解决方案ȁ4;任何经过微调的体系结构(例如抗电源攻击的体系结构)都可以采用这种方法。易于配备故障攻击电阻,而不会干扰其原始电阻。该优点使提出的方案与现有对策区别开来。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号