【24h】

Side Channel Cryptanalysis on XTR Public Key Cryptosystem

机译:XTR公钥密码系统上的旁通道密码分析

获取原文
获取原文并翻译 | 示例

摘要

The XTR public key cryptosystem was introduced in 2000. XTR is suitable for a variety of environments including low-end smart cards, and is regarded as an excellent alternative to RSA and ECC. Moreover, it is remarked that XTR single exponentiation (XTR-SE) is less susceptible than usual exponentiation routines to environmental attacks such as the timing attack and the differential power analysis (DPA). This paper investigates the security of side channel attack (SCA) on XTR. In this paper, we show the immunity of XTR-SE against the simple power analysis if the order of the computation of XTR-SE is carefully considered. In addition, we show that XTR-SE is vulnerable to the data-bit DPA, the address-bit DPA, the doubling attack, the modified refined power analysis, and the modified zero-value attack. Moreover, we propose some counter-measures against these attacks. We also show experimental results of the efficiency of the countermeasures. From our implementation results, if we compare XTR with ECC with countermeasures against "SCAs," we think XTR is as suitable to smart cards as ECC.
机译:XTR公钥密码系统于2000年推出。XTR适用于各种环境,包括低端智能卡,并且被视为RSA和ECC的绝佳替代品。此外,需要指出的是,XTR单指数(XTR-SE)比常规的指数例程对环境攻击(如定时攻击和差分功率分析(DPA))的敏感性更低。本文研究了XTR上的旁路攻击(SCA)的安全性。在本文中,如果仔细考虑XTR-SE的计算顺序,我们将展示XTR-SE对简单功率分析的抵抗力。此外,我们表明XTR-SE容易受到数据位DPA,地址位DPA,加倍攻击,修改后的精细功率分析和修改后的零值攻击的攻击。此外,我们提出了针对这些攻击的一些对策。我们还显示了对策效率的实验结果。从我们的实施结果来看,如果我们将XTR和ECC与针对“ SCA”的对策进行比较,我们认为XTR和ECC同样适用于智能卡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号