计算机科学 ›› 2011, Vol. 38 ›› Issue (3): 76-79.

• 计算机网络与信息安全 • 上一篇    下一篇

基于错误检验故障的RSA-CRT差分故障分析

陈财森,王韬,田军舰,张金中   

  1. (军械工程学院计算机工程系 石家庄050003)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60772082),河北省自然科学基金(08M010)资助。

Differential Fault Analysis on RSA-CRT Based on Fault in Error Checking Operation

CHEN Cai-sen,WANG Tao,TIAN Jun-jian,ZHANG Jin-zhong   

  • Online:2018-11-16 Published:2018-11-16

摘要: 原有基于模幂运算故障的RSA-CRT故障攻击算法,因添加了错误检验操作而失效。为寻找新的故障攻击方法,以BOS防御算法为攻击分析对象,针对在检错步骤产生故障的情况进行分析,建立了基于错误检验故障的攻击模型,提出了能够完整推算出RSA密钥的差分故障攻击算法。进行了推导论证和实验仿真,结果表明原有防御措施并不能有效地抵御故障攻击,新的攻击算法具有良好的可行性,在算法复杂度上,比Wagner的攻击算法需要更少的搜索空间,单个字节故障最多只需要256个样本空间。最后分析了原有防御算法的问题所在,同时给出了相应的防御建议。

关键词: 旁路攻击,故障模型,差分故障分析,错误检验,中国剩余定理,RSA密码算法

Abstract: The former fault analysis can't attack on RSA-CRT with corresponding countermeasure. In order to find the new vulnerability to fault analysis,this paper took BOS countermeasure as the analyzed object An attack model based on fault in error checking operation was advanced, and a differential fault analysis algorithm was given that can completely recover the RSA key. The fact that the previous countermeasures can't effectively resist the differential fault analysis was demonstrated,and the complexity of our attack was estimated both by a theoretical analysis and software simulations. Experiment results show that the new fault analysis algorithm has well feasibility, it requires less faulty signature samples than Wagner's attack algorithm, almost need 256 samples for single byte fault Finally, a corresponding advice on countermen sure to differential fault analysis was given by analyzing the problem of previous countermeasures.

Key words: Side channel attack, Fault model, Differential fault analysis, Error checking, Chinese remainder theorem,RSA

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!