Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2010, Vol. 36 ›› Issue (3): 131-133. doi: 10.3969/j.issn.1000-3428.2010.03.043

• Security Technology • Previous Articles     Next Articles

Implementation Algorithm of Pseudo Modular Inversion Secure Against Side Channel Attack

DU Zhi-bo, CHEN Yun, WU Zhen, CHEN Jun, ZHOU Li-sha   

  1. (Information Security Institute, Chengdu University of Information Technology, Chengdu 610225)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-02-05 Published:2010-02-05

防范边信道攻击的逆伪操作实现算法

杜之波,陈 运,吴 震,陈 俊,周俐莎   

  1. (成都信息工程学院信息安全研究所,成都 610225)

Abstract: In view of the problems of the Binary Representation(BR) algorithm for modular exponentiation against the side channel attacks, a new solution named as pseudo modular inversion algorithm is presented for the goal of erasing the difference of power consumption among the operational units. It is testified that the expected goal is reached to by demonstrating the power trace between the original BR algorithm and the new one.

Key words: public key cryptosystem, side channel attack, pseudo modular inversion algorithm, real measured power curve

摘要: 针对模幂运算的二元表示(BR)算法在防范边信道攻击方面存在的问题,以消除运算单元之间的功耗差异为目的,提出模幂运算的逆伪操作算法。通过对基本BR算法和逆伪操作算法的实测功耗轨迹对比和对逆伪操作算法防范边信道攻击分析,证明逆伪操作运算已达到消除运算单元之间功耗差异的预期目标。

关键词: 公钥密码系统, 边信道攻击, 逆伪操作算法, 实测功耗曲线

CLC Number: