Font Size: a A A

Research On Power Analysis And Experimental Verification Of Two Common Cryptosystems

Posted on:2012-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:W ChengFull Text:PDF
GTID:2218330362959239Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As the core technology of information security, the security of cryptographic algorithms is usually determined by the cost of mathematical analysis. However, in practical applications, cryptographic algorithms are usually implemented through a variety of cryptographic chips. The security is not only associated with the cryptographic algorithms, but also with the implementation of software and hardware design. Side-channel Attack, as a very important branch of crypto engineering, exploits side-channel information to reveal secret parameters. Amongst all of side-channel attacks, power analysis attack is most dangerous and easily performed. It has drawn much attention to researchers in the world.RSA is accepted as one of the best public cryptosystem in both theory and application. It has been widely used in digital signatures and authentication. Typical applications are in the payment and identification area, where public key cryptography can provide strong authentication combined with flexible key management. COMP128 is incorporated as the authentication method between the SIM card and the base station in GSM protocol. Most domestic GSM systems use it to protect SIM cards from being cloned.This thesis focuses on these two cryptosystems. We make research on power analysis attacks, propose corresponding attack scenarios, and verify them with experiments. Based on it, we also present countermeasures against power analysis. The main work and innovation points are as follows:Construct experimental platform. We construct the experimental platform and define the function of each part. It can be expanded in follow-up research. Using this experimental platform, we verify attack methods and countermeasures.For RSA and its various implementations, we improve the power analysis attack and present new attacks. Previous work shows RSA cannot resist the power analysis attack. However the attack is not very efficient. In this thesis, we present an attack to improve the efficiency, and reduce the power traces required in the attack. The new methods attack the algorithm from different aspects, which can increase the difficulty of resistant.We propose attack against COMP128 and verify it in SIM card which we use in daily life. The success of experiment on COMP128 shows that COMP128 has significant security vulnerabilities in its implementation.By analyzing the existing vulnerabilities of RSA and COMP128, we present countermeasures against power analysis attack based on masking techniques. These countermeasures destroy the dependency between power and data, and are hard to be exploited by attackers.
Keywords/Search Tags:Side-channel Attack, Power Analysis Attack, Countermeasure, RSA, COMP128
PDF Full Text Request
Related items