首页 | 官方网站   微博 | 高级检索  
     

针对RSA密码芯片的SEMD算法攻击实验
引用本文:范黎恒,郭铁轩,彭永怀.针对RSA密码芯片的SEMD算法攻击实验[J].兵工自动化,2009,28(12):91-93,96.
作者姓名:范黎恒  郭铁轩  彭永怀
作者单位:1. 驻北碚地区军代室,重庆,400711
2. 驻绵阳地区军代室,四川,绵阳,621000
摘    要:为了对RSA密码芯片的DPA攻击进行深入研究,介绍采用相应攻击算法对AT89C52单片机上加密程序进行攻击的过程,设计并搭建了功耗分析测试平台。利用该平台,对单片机实现的8位模拟RSA加密算法进行了SEMD算法差分功耗分析(DPA)攻击实验。实验结果表明:当进行差分的功耗轨迹中对应部分无法准确对齐时,SEMD攻击算法存在失效现象。

关 键 词:RSA  差分功耗分析  模幂算法  SEMD算法

Experiment of SEMD Algorithm Attack Against RSA Cipher Chip
FAN Li-heng,GUO Tie-xuan,PENG Yong-huai.Experiment of SEMD Algorithm Attack Against RSA Cipher Chip[J].Ordnance Industry Automation,2009,28(12):91-93,96.
Authors:FAN Li-heng  GUO Tie-xuan  PENG Yong-huai
Affiliation:FAN Li-heng, GUO Tie-xuan, PENG Yong-huai (1. PLA Military Representative Office in Beibei Region, Chongqing 400711, China; 2. PLA Military Representative Office in Mianyang Region, Mianyang 621000, China)
Abstract:In order to studying the DPA attack of RSA cipher chip, introduce the attack process on coded program of AT89C52 single chip by corresponding attack algorithm, a power consumption analysis testing platform was designed and constructed. With this platform, SEMD algorithm differential power analysis (DPA) attack experiment against the 8 bit simulated RSA running in a single chip was carried out. In the experiment, SEMD attack algorithm became workless when the corresponding parts in the different power traces can not be arranged.
Keywords:RSA
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号