...
首页> 外文期刊>International Journal of Information Security >Using templates to distinguish multiplications from squaring operations
【24h】

Using templates to distinguish multiplications from squaring operations

机译:使用模板将乘法与平方运算区分开

获取原文
获取原文并翻译 | 示例

摘要

Since side channel analysis was introduced as a method to recover secret information from an otherwise secure cryptosystem, many countermeasures have been proposed to prevent leakage from secure devices. Among these countermeasures is side channel atomicity that makes operations indistinguishable using side channel analysis. In this paper, we present practical results of an attack on RSA signature generation, protected in this manner, based on the expected difference in Hamming weight between the result of a multiplication and a squaring operation. This work presents the first attack that we are aware of where template analysis can be used without requiring an open device to characterize an implementation of a given cryptographic algorithm. Moreover, an attacker does not need to know the plaintexts being operated on and, therefore, blinding and padding countermeasures applied to the plaintext do not hinder the attack in anyway.
机译:由于引入了旁信道分析作为从其他安全密码系统中恢复秘密信息的方法,因此提出了许多对策来防止从安全设备中泄漏。在这些对策中,有旁通道原子性,这使得使用旁通道分析无法区分操作。在本文中,我们基于乘法运算和平方运算之间汉明权重的预期差异,提出了以这种方式保护的RSA签名生成攻击的实际结果。这项工作提出了我们知道的第一次攻击,该攻击可以在不需要开放设备表征给定密码算法的实现的情况下可以在哪里使用模板分析。此外,攻击者无需了解正在操作的明文,因此,对明文应用的盲目和填充对策无论如何也不会阻碍攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号