...
首页> 外文期刊>International journal of interdisciplinary telecommunications and networking >Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm
【24h】

Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm

机译:滑动窗口指数算法研究针对RSA的缓存定时攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The vulnerabilities of the RSA cryptographic algorithm are analyzed, and it is not securely implemented. As the simultaneous multithreading could enable multiple execution threads to share the execution resources of a superscalar between the chipper process and the spy process, the shared access to memory caches provides an easily used high bandwidth covert channel between threads, allowing that a malicious thread can monitor the execution of another thread. This paper targets at RSA algorithm which is implemented with sliding window exponentiation algorithm via OpenSSL, the attacker can monitor the cryptographic thread by executing a spy thread, recording the timing characteristic during the RSA decryption when reading the Cache. The attacker can recover the original key via analyzing these timing measurements. Finally, the authors provide some countermeasures of how this attack could be mitigated or eliminated entirely.
机译:分析了RSA密码算法的漏洞,并且没有安全地实现它。由于同时多线程可以使多个执行线程在削片程序进程和间谍程序之间共享超标量的执行资源,因此对内存缓存的共享访问提供了线程之间易于使用的高带宽隐蔽通道,从而允许恶意线程可以监视执行另一个线程。本文针对RSA算法,该算法通过OpenSSL通过滑动窗口幂运算算法实现,攻击者可以通过执行间谍线程来监视加密线程,并在读取Cache时记录RSA解密期间的时序特征。攻击者可以通过分析这些计时度量来恢复原始密钥。最后,作者提供了一些如何完全缓解或消除这种攻击的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号