作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (3): 131-133. doi: 10.3969/j.issn.1000-3428.2010.03.043

• 安全技术 • 上一篇    下一篇

防范边信道攻击的逆伪操作实现算法

杜之波,陈 运,吴 震,陈 俊,周俐莎   

  1. (成都信息工程学院信息安全研究所,成都 610225)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-02-05 发布日期:2010-02-05

Implementation Algorithm of Pseudo Modular Inversion Secure Against Side Channel Attack

DU Zhi-bo, CHEN Yun, WU Zhen, CHEN Jun, ZHOU Li-sha   

  1. (Information Security Institute, Chengdu University of Information Technology, Chengdu 610225)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-02-05 Published:2010-02-05

摘要: 针对模幂运算的二元表示(BR)算法在防范边信道攻击方面存在的问题,以消除运算单元之间的功耗差异为目的,提出模幂运算的逆伪操作算法。通过对基本BR算法和逆伪操作算法的实测功耗轨迹对比和对逆伪操作算法防范边信道攻击分析,证明逆伪操作运算已达到消除运算单元之间功耗差异的预期目标。

关键词: 公钥密码系统, 边信道攻击, 逆伪操作算法, 实测功耗曲线

Abstract: In view of the problems of the Binary Representation(BR) algorithm for modular exponentiation against the side channel attacks, a new solution named as pseudo modular inversion algorithm is presented for the goal of erasing the difference of power consumption among the operational units. It is testified that the expected goal is reached to by demonstrating the power trace between the original BR algorithm and the new one.

Key words: public key cryptosystem, side channel attack, pseudo modular inversion algorithm, real measured power curve

中图分类号: