首页 | 本学科首页   官方微博 | 高级检索  
     检索      

RSA密码算法的安全及有效实现
引用本文:张宝华,殷新春.RSA密码算法的安全及有效实现[J].中山大学学报(自然科学版),2008,47(6).
作者姓名:张宝华  殷新春
作者单位:1. 复旦大学,计算机科学技术学院,上海,200433
2. 扬州大学,信息工程学院,江苏,扬州,225009
基金项目:国家自然科学基金,国家高技术研究发展计划(863计划),江苏省六大人才高峰基金
摘    要: RSA密码算法的实现电路易受到诸如能量分析、时间分析等旁门攻击。综述了RSA密码算法中模幂运算的主要攻击方法及其防御措施。针对模幂运算的软件实现和硬件实现,提出了基于随机概率的软件实现防御措施和基于模幂指数三进制表示的硬件实现防御措施。两种防御措施较之前的防御措施在安全性和效率方面都有显著的提高。两种防御措施具有通用性,可移植到ECC中的标量乘法运算中去。

关 键 词:RSA密码算法  旁门攻击  软件实现  硬件实现  模幂
收稿时间:2008-03-05;

Secure and Efficient Implementation for RSA Cryptographic Algorithm
ZHANG Bao-hua,YIN Xin-chun.Secure and Efficient Implementation for RSA Cryptographic Algorithm[J].Acta Scientiarum Naturalium Universitatis Sunyatseni,2008,47(6).
Authors:ZHANG Bao-hua  YIN Xin-chun
Institution:(1. School of Computer Science, Fudan University, Shanghai 200433, China;2. Information Engineering College, Yangzhou University, Yangzhou 225009, China)
Abstract:The implementation of RSA cryptosystems is vulnerable to SCA attacks such as power analysis and time attack. First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized. Then the software countermeasures based on random probability and hardware countermeasure based on the 3-adic representation of exponent were proposed. Analysis shows that the two countermeasures achieved great improvements in both security and efficiency compared to existed countermeasures. Both two generic countermeasures can be transplanted to the scalar multiplication of ECC.
Keywords:RSA cryptographic algorithm  side channel attacks  software implementation  hardware implementation  exponentiation
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《中山大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《中山大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号