首页 | 本学科首页   官方微博 | 高级检索  
   检索      

Cache计时攻击对E1Gamal签名的安全威胁分析
引用本文:周平,寇应展,刘会英,陈财森.Cache计时攻击对E1Gamal签名的安全威胁分析[J].军械工程学院学报,2012(5):42-48.
作者姓名:周平  寇应展  刘会英  陈财森
作者单位:[1]军械工程学院计算机工程系,河北石家庄050003 [2]61136部队,陕西华阴714200
基金项目:国家自然科学基金资助项目(61173191)
摘    要:分析了E1Gamal签名中模幂运算的平方乘算法和滑动窗口算法,给出了两种算法下利用Cache计时采集旁路信息的方法和幂指数恢复算法,分析了Cache计时攻击对幂指数相关的旁路信息获取能力以及Cache计时攻击对E1Gamal签名的安全性威胁.通过仿真验证了Cache计时攻击能够有效获取旁路信息,展示了不同长度随机密钥的安全等级,给出了建议采用的随机密钥长度与可能的防御措施.

关 键 词:Cache计时攻击  E1Gamal签名  模幂运算  随机密钥

Analysis of Vulnerability in EIGamal Signature Due to Cache Timing Attack
ZHOU Ping,KOU Ying-zhan,LIU Hui ying,CHEN Cai-sen.Analysis of Vulnerability in EIGamal Signature Due to Cache Timing Attack[J].Journal of Ordnance Engineering College,2012(5):42-48.
Authors:ZHOU Ping  KOU Ying-zhan  LIU Hui ying  CHEN Cai-sen
Institution:1. Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, 2. Unit 61136, Huayin 714200)
Abstract:This paper analyzes square-multiplication method and sliding window method for modular exponentiation used in ElGamal signature, and proposes corresponding technology of collecting side channel information with Cache timing and algorithms for recovering exponent. The ability to gain exponent-related side channel information and the impact on E1Gamal signature are analyzed. The results of simulation experiment demonstrate the ability of Cache tim ing attack and show the security levels of varied keysizes. The suggested keysize of nonce and pos- sible countermeasures are pointed out.
Keywords:Cache timing attack  ElGamal signture  modular exponentiation  nonce
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号