Font Size: a A A

Research And Implementation Of Power Analysis Attacks Based On Cryptographic Chip Of RSA Algorithm

Posted on:2013-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y L LiuFull Text:PDF
GTID:2268330392470606Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the security ofinformation has become a growing concern in today’s society. Cryptographicalgorithm is the core technology to ensure information security, and its security hasalways been a hot issue among the researchers at home and abroad. For a long time,many experts and scholars committed to looking for defects of cryptographicalgorithms from a mathematical point of view, and then get the crack ways. But thisneed to accumulate a lot of mathematical knowledge, and usually takes a very longtime. However, with the continuous application of cryptographic algorithms in reallife, people found that the cryptographic equipment will reveal a lot of information inthe process of running equipment, such as execution time, power consumption,electromagnetic radiation, etc. Using the mathematical knowledge to analysis of thesedata, it can be relatively easy access to the information of the key, so this method iscalled side-channel attack. Power analysis attack is the most widely method ofside-channel attack, it is based on the correlation between the operation of the deviceand its power consumption to presumed the key. Power analysis attack has becomethe most threatening attack because of its low cost, small key search space.Public key cryptography is a very important branch of modern cryptographysystem. The RSA algorithm is the most widely recognized algorithm in public keycryptography system, it not only can be used to encrypt and digital signature, but alsoplayed a central role in the area of security certification. It is the most successfulpublic key cryptosystem by far, whether in industry or academia, RSA algorithm arecause for concern, and has been applied in a variety of products and platforms.Researching RSA cryptographic algorithm against power analysis attack capabilityand its defensive measures has a very important significance for China’s economicsecurity.We carried out a lot of research work on the power analysis attack based on theRSA cryptosystem execution algorithm and the ASIC implementation of theRSA-RNS algorithm. We not only carried out a detailed study of the RSA algorithmbased on Residue Number System and analysis of the key features of its hardwareimplementation, but also learned the basis of theoretical and realization of power analysis attack. We have built a platform of power analysis attack. The main workand innovations are as follows:Firstly, design the software processes of power analysis platform using EDAtools and achieve security testing platform for the hardware design of cryptographicalgorithms. The focus of this platform is power analysis attacks part, including powercollection and power analysis. Verify the correctness of the platform by successfulattacking a simple hardware implementation of RSA algorithm.Secondly, implement variety of power analysis attack algorithms, such as SEMD,MESD, ZEMD and CPA. These algorithms are the library of power analysis, which isvery important part of security testing platform.Thirdly, research on power analysis attack based on the ASIC implementation ofthe RSA algorithm and the hardware implementation of RSA-RNS algorithm. Studythe ability of its anti-power analysis attacks.
Keywords/Search Tags:side-channel attack, power analysis attack, RSA, transporttrigger architecture, residue number system
PDF Full Text Request
Related items