针对RSA 密码芯片的ZEMD 算法攻击实验
基金项目:

国家863 计划项目(2007AA01Z454)


Experiment of SEMD Algorithm Attack Against RSA Code Chip
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [4]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    为了对RSA 密码芯片的DPA 攻击进行深入研究,采用相应攻击算法对AT89C52 单片机上加密程序进行攻 击,设计并搭建功耗分析测试平台。利用该平台,对单片机实现的8 位模拟RSA 加密算法进行ZEMD 算法差分功耗 分析(Differential Power Analysis,DPA)攻击实验。实验结果表明,由于明文的随机输入,使得模乘运算的时间 消耗会有所不同,导致进行差分的功耗轨迹中对应部分无法准确对齐,ZEMD 攻击算法存在失效现象。

    Abstract:

    In order to research on DPA attack of RSA code chip, adopt corresponding attack method to attack encrypt program on AT89C52 single chip, a power consumption analysis testing platform was designed and constructed. With this platform, SEMD algorithm differential power analysis (DPA) attack experiment against the 8 bit simulated RSA running in a single chip was carried out. In the experiment, ZEMD attack algorithm became workless when the corresponding parts in the different power traces cannot be arranged. The reason of these phenomena was the random input of the plaintext.

    参考文献
    [1] P. Kocher, J. Jaffe, and B. Jun. Differential power analysis[C]// In: M. Wiener, editor. Advances in Cryptology: Proceedings of CRYPTO’99. Volume 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA: Springer-Verlag, 1999: 388–397.
    [2] 韩军, 曾晓洋, 汤庭鳌. RSA 密码算法的功耗轨迹分析 及其防御措施[J]. 计算机学报, 2006, 29(4): 590-596.
    [3] T. S. Messerges, E. A. Dabbish, R. H. Sloan. Investigations of power analysis attacks on smartcards. Proc. USENIX Workshop on Smartcard Technology, 1999.
    [4] D. E. Kunch. Seminumerical Algorithm. In the Art of Computer Programming, Vol. 2, Addison-Wesley, 1981.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

范黎恒,柏代军,张鑫.针对RSA 密码芯片的ZEMD 算法攻击实验[J].,2011,30(02):47-48.

复制
分享
文章指标
  • 点击次数:658
  • 下载次数: 427
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2013-01-16
文章二维码