登录    注册    忘记密码

详细信息

To Construct High Level Secure Communication System: CTMI Is Not Enough  ( SCI-EXPANDED收录)  

文献类型:期刊文献

英文题名:To Construct High Level Secure Communication System: CTMI Is Not Enough

作者:Xu, Sen[1];Lu, Xiangjun[1];Chen, Aidong[2];Zhang, Haifeng[1,4];Gu, Haihua[3];Gu, Dawu[1];Zhang, Kaiyu[1];Guo, Zheng[1];Liu, Junrong[1]

第一作者:Xu, Sen

通讯作者:Gu, DW[1]

机构:[1]Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China;[2]Beijing Union Univ, Dept Software Engn, Beijing 100101, Peoples R China;[3]Wanda Internet Technol Grp, Shanghai 200127, Peoples R China;[4]Beijing Smart Chip Microelect Technol Co Ltd, Beijing, Peoples R China

第一机构:Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China

通讯机构:[1]corresponding author), Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China.

年份:2018

卷号:15

期号:11

起止页码:122-137

外文期刊名:CHINA COMMUNICATIONS

收录:;Scopus(收录号:2-s2.0-85057541497);WOS:【SCI-EXPANDED(收录号:WOS:000449981700011)】;

基金:This work is supported by the Key Technology Research and Sample-Chip Manufacture on Resistance to Physical Attacks at Circuit Level (546816170002)

语种:英文

外文关键词:information security; side channel analysis; elliptic curve digital signature algorithm; constant time modular inversion; hamming weight leakage

摘要:Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure conununication systems, such as OpenSSL, and a variety of information security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigating the security of the entire communication system. Previous countermeasures of PKC implementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of intermediate data through side-channel leakage. Then. we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous necessary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowledge, this is the first time for evaluating the practical security of CTMI and experimental results show the fact that CTMI is not enough for high-level secure communication systems.

参考文献:

正在载入数据...

版权所有©北京联合大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心