首页> 外文期刊>Journal of circuits, systems and computers >A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based
【24h】

A New Side-Channel Attack on Reduction of RSA-CRT Montgomery Method Based

机译:基于RSA-CRT蒙哥马利方法的减少的新的侧频攻击

获取原文
获取原文并翻译 | 示例

摘要

RSA-CRT is one of the most common algorithms in the digital signature. Several side-channel attacks have been presented on the implementation of RSA-CRT. One of the most important side-channel attacks on RSA-CRT is Modular Reduction on Equidistant Data (MRED). The implementation of RSA-CRT has too many challenges in the multiplications when the key size is too long (e.g. 2048 bits). Montgomery multiplication is one of the common methods for executing the RSA multiplication, which has many implementation problems and side-channel leakage challenges. This article first implements an RSA-CRT algorithm based on the Montgomery multiplication with the high-speed and low area hardware. The implementation is named RSA-CRT-MMB (Montgomery Method Based). Next, a new power analysis side-channel attack on RSA-CRT-MMB is presented. We name our attack MRED on MMB. The attack utilizes new side-channel leakage information about the CRT reduction algorithm implemented by the MMB, for the first time. The previous articles do not investigate the MRED attack on Montgomery multiplication in RSA-CRT. Finally, a new countermeasure is presented to prevent the MREDM attack. The countermeasure does not have any overload in the hardware area or running time of the RSA algorithm. The correctness of our scheme, the 2048-bit RSA-CRT-MMB, is investigated by the implementation of the scheme on the SASEBO-W board in our DPA laboratory. The total running time of 2048-bit RSA is 250ms and the RSA algorithm occupies only 23% of LUT slice on Spartan-6 FPGA. The proposed countermeasures are also verified by practical experiments.
机译:RSA-CRT是数字签名中最常见的算法之一。 RSA-CRT的实现已经提出了几种侧频攻击。 RSA-CRT上最重要的侧通道攻击之一是等距数据(MERD)的模块化减少。当关键尺寸太长时,RSA-CRT的实施在乘法中有太多挑战(例如,2048位)。 Montgomery乘法是执行RSA乘法的常用方法之一,其具有许多实现问题和侧通道泄漏挑战。本文首先利用了基于蒙格马利乘法的RSA-CRT算法,具有高速和低区域硬件。该实现名为RSA-CRT-MMB(基于蒙格组合方法)。接下来,提出了关于RSA-CRT-MMB的新功率分析侧通道攻击。我们在MMB上命名我们的攻击MRED。该攻击利用关于MMB实​​现的CRT减少算法的新的侧通道泄漏信息。以前的文章没有调查关于RSA-CRT中蒙哥马利乘法的MERD攻击。最后,提出了一种新的对策,以防止MREDM攻击。对策在RSA算法的硬件区域或运行时间内没有任何过载。我们的计划的正确性,即2048位RSA-CRT-MMB,通过在我们的DPA实验室的SASEBO-W董事会上实施方案来研究。 2048位RSA的总运行时间为250ms,RSA算法仅占Spartan-6 FPGA的23%的LUT切片。通过实际实验还验证了拟议的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号