【24h】

On the BRIP Algorithms Security for RSA

机译:关于RSA的BRIP算法安全性

获取原文
获取原文并翻译 | 示例

摘要

Power Analysis has been intensively studied since the first publications in 1996 and many related attacks on naive implementations have been proposed. Nowadays algorithms in tamper resistant devices are protected by different countermeasures most often based on data randomization such as the BRIP algorithm on ECC and its RSA derivative. However not all of them are really secure or in the best case proven to be secure. In 2005, Yen, Lien, Moon and Ha introduced theoretical power attacks on some classical and BRIP exponentiation implementations, characterized by the use of a chosen input message value ±1. The first part of our article presents an optimized implementation for BRIP that takes advantage of the Montgomery modular arithmetic to speed up the mask inversion operation. An extension of the Yen et al. attack, based on collision detection through power analysis, is also presented. Based on this analysis we give security advice on this countermeasure implementation and determine the minimal random length to reach an appropriate level of security.
机译:自1996年首次发布以来,对Power Analysis进行了深入研究,并且提出了许多针对幼稚实现的相关攻击。如今,基于数据随机化,防篡改设备中的算法通常通过不同的对策来保护,例如基于ECC的BRIP算法及其RSA派生算法。但是,并非所有这些工具都是真正安全的,或者在最佳情况下也被证明是安全的。 2005年,Yen,Lien,Moon和Ha引入了一些经典和BRIP指数实现的理论功率攻击,其特征在于使用选定的输入消息值±1。本文的第一部分介绍了针对BRIP的优化实现,该实现利用了Montgomery模块化算法来加快掩模反转操作。延等人。还提出了基于通过功率分析进行碰撞检测的攻击。基于此分析,我们针对此对策实施提供安全建议,并确定最小随机长度以达到适当的安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号