...
首页> 外文期刊>International journal of circuit theory and applications >Side-channel analysis of the modular inversion step in the RSA key generation algorithm
【24h】

Side-channel analysis of the modular inversion step in the RSA key generation algorithm

机译:RSA密钥生成算法中模块化反演步骤的侧信道分析

获取原文
获取原文并翻译 | 示例
           

摘要

This paper studies the security of the RSA key generation algorithm with regard to side-channel analysis and presents a novel approach that targets the simple power analysis (SPA) vulnerabilities that may exist in an implementation of the binary extended Euclidean algorithm (BEEA). The SPA vulnerabilities described, together with the properties of the values processed by the BEEA in the context of RSA key generation, represent a serious threat for an implementation of this algorithm. It is shown that an adversary can disclose the private key employing only one power trace with a success rate of 100 % - an improvement on the 25% success rate achieved by the best side-channel analysis carried out on this algorithm. Two very different BEEA implementations are analyzed, showing how the algorithm's SPA leakages could be exploited. Also, two countermeasures are discussed that could be used to reduce those SPA leakages and prevent the recovery of the RSA private key. Copyright (c) 2016 John Wiley & Sons, Ltd.
机译:本文研究了有关边信道分析的RSA密钥生成算法的安全性,并提出了针对二进制扩展欧几里德算法(BEEA)实现中可能存在的简单功率分析(SPA)漏洞的新颖方法。所描述的SPA漏洞以及BEEA在RSA密钥生成的上下文中处理的值的属性,对该算法的实现构成了严重威胁。结果表明,对手可以仅使用一条功率跟踪来公开私钥,成功率为100%-通过对该算法执行最佳的边信道分析,成功率提高了25%。分析了两个非常不同的BEEA实现,显示了如何利用算法的SPA泄漏。此外,讨论了两个对策,可以用来减少这些SPA泄漏并防止RSA私钥的恢复。版权所有(c)2016 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号