通信学报 ›› 2013, Vol. 34 ›› Issue (Z1): 156-161.doi: 10.3969/j.issn.1000-436x.2013.z1.020

• 学术论文 • 上一篇    下一篇

基于Montgomery算法安全漏洞的SPA攻击算法

甘刚,王敏,杜之波,吴震   

  1. 成都信息工程学院 网络工程学院,四川 成都 610225
  • 出版日期:2013-08-25 发布日期:2017-06-23
  • 基金资助:
    “十二五”国家密码发展基金资助项目;四川省科技支撑计划基金资助项目;四川省教育厅重点科研基金资助项目

Simple power analysis attack against cryptosystems based on Montgomery algorithm

Gang GAN,Min WANG,Zhi-bo DU,Zhen WU   

  1. Network Engineering Department, Chengdu University of Information Technology, Chengdu 610225, China
  • Online:2013-08-25 Published:2017-06-23
  • Supported by:
    “The 12th Five-Years” National Cryptogram Development Fund;The Science and Technol-ogy Support Program of Sichuan Province;Education Department Key Scientific Research Projects of Sichuan Prov-ince

摘要:

公钥密码体制的算法大多基于有限域的幂指数运算或者离散对数运算。而这些运算一般会采用Montgomery算法来降低运算的复杂度。针对Montgomery算法本身存在可被侧信道攻击利用的信息泄露问题,从理论和实际功耗数据2方面分析了Montgomery算法存在的安全漏洞,并基于该漏洞提出了对使用Montgomery算法实现的模幂运算进行简单能量分析(SPA,simple power analysis)攻击算法。利用该算法对实际模幂运算的能量曲线进行了功耗分析攻击。实验表明该攻击算法是行之有效的。

关键词: 模幂运算, 侧信道攻击, 简单能量分析攻击, Montgomery算法

Abstract:

The Montgomery algorithm is widely used to reduce the computational complexity of large integer modular exponentiation. The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive informa-tion leakage could be used by side-channel attack. The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. The results show that the attack algorithm is correct and effective.

Key words: modular exponentiation, side-channel attack, simple power analysis, Montgomery algorithm

No Suggested Reading articles found!