Font Size: a A A

Investigations Of Power Analysis Attacks On Cryptographic Hardware Of Rainbow Signature Scheme

Posted on:2013-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2248330374974874Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Multivariate public key cryptosystem (MPKC) is considered to be one of severalpublic-key cryptosystem that can defend quantum computer attacks in the future, thesecurity foundation of MPKC is the knowledge that solving a set of multivariate polynomialequations over a finite filed is a NP-hard problem, MPKC has some other advantages, such ashigh safety, lower computation overhead, suitable for hardware implementation, therefore, itis recognized as cryptosystem and digital signature alternative in the era of quantumcomputers. Many scholars currently have begun to research the practical application of theMPKC signature both at home and abroad, especially in some small devices’ applications,such as mobile phones, smart cards, RFID, and so on. In2005, Ding and Schmidt proposedsafer Rainbow signature scheme, if Rainbow selects apt parameters, Rainbow can resist thepresently known all effective attacks methods, it has more safety and efficiency. In theembedded encryption systems, Attacker can get key by monitoring the physical leakageinformation of the hardware, such as current or voltage, this method is called Side-ChannelAttacks (SCA), SCA becomes a research hotspot as a new attack methods, Power AnalysisAttacks research is the most popular in various SCA methods, because Power AnalysisAttacks is efficiency and low cost.We know Rainbow signature is hard to be attacked by the traditional methods, but wedon’t know whether Rainbow signature hardware can resist Power Analysis Attacks, based onthis perspective, we try to explor the possibility that the Rainbow signature hardware canresist Power Analysis Attacks in this paper, and then we try to improve Rainbow algorithmand hardware design. In the paper, fisrt, we should gather power curves with oscilloscopewhen the cipher algorithm is running on the cipher hardware, then preprocess the powercurves to reduce the noise, the methods include alignment, FFT, low-pass filtering,compression. Second, we research the leakage point of Rainbow and build power leakagemodel, at last we prove that Rainbow cann’t resist power attack with the simulation attackexperiments. Next, we do the same experiments at real environment and with the powercurves preprocessing method.Finallly, this paper proposes some measures to resist Power Analysis Attacks, and dothe simulation attack experiments to confirm such measures.
Keywords/Search Tags:Multivariate Public Key Cryptosystem, Rainbow, Power Analysis Attacks, PowerLeakage Model
PDF Full Text Request
Related items