摘要: RSA密码算法执行过程中的模幂运算时间是不固定的,精确测量解密过程中泄露出的时间差异信息即可推断出相关密钥。为此,研究RSA公钥密码算法的实现和计时攻击原理,分析RSA解密运算过程,找出RSA在计时攻击中存在的安全缺陷。在简单计时攻击的基础上,提出基于从左到右“平方-乘法”模幂运算的RSA差分计时攻击算法,并介绍相应的防御措施。
关键词:
旁路攻击,
差分计时攻击,
模幂运算,
公钥密码
Abstract: The time of modular exponentiation is not constant when RSA cryptographic algorithm is executed, so carefully measuring the information about different time to decrypt can deduce the secret key. This paper researches the implementation of RSA public-key cryptographic algorithm and the principle of the timing attack, analyzes the process of RSA decryption, discovers the vulnerabilities of RSA on timing attack, presents the algorithm of differential timing attack on RSA using from left to right “square-multiply” modular exponentiation, and discusses how to defense timing attack on RSA.
Key words:
side channel attack,
differential timing attack,
modular exponentiation,
public-key cryptography
中图分类号:
田军舰, 寇应展, 陈财森, 马秀峰. RSA公钥密码算法差分计时攻击研究[J]. 计算机工程, 2011, 37(5): 146-148.
TIAN Jun-Jian, KOU Ying-Zhan, CHEN Cai-Sen, MA Xiu-Feng. Research of Differential Timing Attack on RSA Public-key Cryptographic Algorithm[J]. Computer Engineering, 2011, 37(5): 146-148.