计算机科学 ›› 2013, Vol. 40 ›› Issue (3): 201-205.

• 信息安全 • 上一篇    下一篇

一种改进的针对滑动窗口模幂运算实现的密码数据Cache计时攻击

周平,寇应展,王韬,赵新杰,刘会英   

  1. (军械工程学院计算机工程系 石家庄 050003)
  • 出版日期:2018-11-16 发布日期:2018-11-16

Improved Data-Cache Timing Attack on Cryptography Adopting Sliding

  • Online:2018-11-16 Published:2018-11-16

摘要: RSA,DSA等公钥密码大都基于“滑动窗口”算法实现模幂运算,其运算过程中进行的Cache访问会产生旁 路信息泄漏并用于密钥破解,基于Cache访问泄漏的幂指数分析算法是提高攻击效率的关键。通过分析现有攻击的 不足,进一步分析了预计算乘法因子到Cache的映射规律,提出了一种基于窗口值判定的幂指数分析改进算法;以基 本模幂运算为例,通过实际攻击实验验证改进算法的效率,结果表明改进算法可恢复出60%的幂指数位,优于前人最 好工作的4700;最后以RSA和DSA为例,给出了改进算法对密钥分析的影响。

关键词: 滑动窗口,模幂运算,RSA, DSA, Cache计时攻击

Abstract: Publio-key cryptography, such as RSA and DSA, adopt sliding window method for modular exponentiation, from which sidcchannel information can be leaked while accessing Cache during execution, thus private key can be de- crypted. Exponent analysis algorithm is the key point to improve the efficiency of the attack. I3y analyzing the shortco- ming of previous work,this paper farther analyzed the relationship between Cacho-access trace and precomputed multi- pliers and proposed an improved exponent analysis algorithm based on window-value identifying. Experiments were made to prove the efficiency the improved algorithm and results showed that the improved algorithm was able to recover 60 0 o exponential bits, which is better than the previous result 47 0 o. In the end, the application of the improved algo- rithm was showed on RSA and DSA.

Key words: Sliding window algorithm, Modular exponentiation, RSA, DSA, Cache timing attack

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!