Font Size: a A A

The Design And Implementation Of Rainbow’s Cryptographic Hardware Security Analysis Tool

Posted on:2013-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:K SunFull Text:PDF
GTID:2248330374976023Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In general, we view a cryptographic algorithm as an ideal mathematical problem toassess its security. For an attacker, he also put his work focus on mathematical calculationsand analysis. Side channel attack (SCA) is one attack method which uses cryptographichardware leaking information during operation to attack. Based on different side channelinformation, SCA can be divided into energy attack, time attack, electromagnetic attack anderror attack. Energy attack is based on analysis of the correlation between the characteristicsof the power consumption of integrated circuits and circuit data, then use statistical methodsto find useful information related on the key in order to find the key.The fast development of the quantum computer technology has make the traditionalpublic key cryptosystems not safe as their security rely on the difficulty of integerfactorization and discrete logarithm, but Multivariate public key cryptosystem (MPKC) is notaffected. The security foundation of MPKC is the knowledge that solving a set of multivariatepolynomial equations over a finite filed is a NP-hard problem. And quantum computer do notappear to have any advantage when dealing with NP-hard problem. So MPKC is consideredbe an important branch of quantum cryptography. Rainbow signature algorithm is one kind ofMPKC, and it is now considered safe and efficient. Moreover, Rainbow also has a highcomputing speed and very suitable for hardware implementation. For now, most of thecryptographic algorithm has been crack by the side channel attack, so study Rainbowalgorithm must also consider whether it can resist side channel attack.In this paper, we study and setup the energy of Rainbow algorithm analysis attackplatform. Firstly, we give a general solution for the energy attack, and optimized the solutionfor the problems encountered in the application. Then we introduce the removing noise theory;At last we setup the platform for Rainbow algorithm. This platform can generate meetingrequirements message, proofreading the result after the hardware computing, acquisitionenergy curves of hardware, and noise pretreatment.
Keywords/Search Tags:Rainbow algorithm, Side channel attack, Noise pretreatment
PDF Full Text Request
Related items