American Journal of Information Science and Computer Engineering
Articles Information
American Journal of Information Science and Computer Engineering, Vol.6, No.2, Jun. 2020, Pub. Date: Nov. 27, 2020
Differential Power Analysis Attack Using RSA-CRT Algorithm
Pages: 6-14 Views: 1014 Downloads: 181
Authors
[01] Xiujun Wang, Beijing Software Testing & QA Center, Zhongguancun Software Park, Beijing, China; Beijing Key Laboratory of Software Testing Technology, Zhongguancun Software Park, Beijing, China.
[02] Wei Wang, Beijing Software Testing & QA Center, Zhongguancun Software Park, Beijing, China; Beijing Key Laboratory of Software Testing Technology, Zhongguancun Software Park, Beijing, China.
[03] Shu Guo, Beijing Software Testing & QA Center, Zhongguancun Software Park, Beijing, China; Beijing Key Laboratory of Software Testing Technology, Zhongguancun Software Park, Beijing, China.
[04] Heng Zhang, School of Information Engineering, China University of Geosciences, Beijing, China.
[05] Xiang Li, School of Information Engineering, China University of Geosciences, Beijing, China.
[06] Siyuan Hai, School of Information Engineering, China University of Geosciences, Beijing, China.
Abstract
RSA-CRT can improve the efficiency of modular exponentiation in RSA algorithm, which is becoming the most widely used encryption algorithm in digital signature and authentication of embedded cryptographic devices, and its security has also received a lot of attention. This paper studies the side channel attack of RSA-CRT algorithm, especially the differential power analysis attacks. The first four bytes of the parameter ‘q’ used to run the RSA-CRT algorithm on the STM32 chip are restored. When the key is restored, 512-bit random hexadecimal plaintext is sent to the single-chip microcomputer through the serial port loop, and then read the ciphertext processed by the chip through the serial port, feed back to the upper computer and record. At the same time, in the encryption process, the power trace generated by the STM32 chip in the process of encryption and decryption is collected and recorded to the upper computer through the electromagnetic probe, and through the oscilloscope combine the trigger signal to select the specific steps of the chip to process the data. (e.g. modular exponentiation in pre-calculation and modular multiplication in reorganization, etc.). The side channel attack system is combined to analyze the curve. Experimental results show that this method can improve the safety performance of the equipment.
Keywords
RSA-CRT Algorithm, CRT, DPA, Side Channel Analysis
References
[01] Feng Yan. (2013). Research on smart card attack and defense based on AES algorithm (Master's thesis, Beijing Jiaotong University).
[02] Edward David Moreno, Leila C. M. Buarque, Floruio Natan & Ricardo Salgueiro (2016). Impact of Asymmetric Encryption Algorithms in a VANET. 11(12), 1118-1131.
[03] Lu Pengyu. (2012). Research and design of general authorization service based on cloud computing and rule engine (Master's thesis, Beijing University of Posts and Telecommunications).
[04] Jagdish C. Patra and Cedric Bornand(2010). A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. 20(6), 1597-1611.
[05] Song Nan. (2015). Research on data security of multi-campus all-in-one card system (Master's thesis, Xi'an University of Architecture and Technology).
[06] Du Zhenyu, Liu Fangzheng and Li Yihong. (2019). APT attack path prediction based on HMM. System Engineering and Electronic Technology (04), 826-834.
[07] Zhi Jingsong. (2017). Research and design of HDCP2.2 transmitter in HDMI (Master's thesis, Beijing University of Technology).
[08] Shi Meng. (2013). Application of LLL algorithm in RSA security analysis (Master's thesis, PLA Information Engineering University).
[09] Yu Yanyan. (2012). Lightweight block cipher algorithm collision energy attack (Master's thesis, Shandong University).
[10] Li Zengju, Shi Ruhui, Wang Jianxin, Li Chao, Li Haibin and Shi Xinling. (2016). Selected plaintext attack on Gauss form CRT-RSA based on DPA. Chinese Journal of Cryptography (02), 202-210.
[11] Zhou Yi, Wang Lei, Li Jun, Yang Xuelei, Gan Fengyuan, Zhao Yingxuan... and Li Wei. (2020). CMOS-compatible mid-infrared multi-channel photonic crystal sensor (English). Journal of Infrared and Millimeter Waves (03), 279-283.
[12] Li Zengju, Peng Qian, Shi Ruhui, Li Chao, Ma Zhipeng and Li Haibin. (2016). Selected plaintext attack on CRT-RSA algorithm. Chinese Journal of Cryptography (05), 447-461.
[13] Gan, Zhang, King Khan.(2019). An improved differential power analysis against random process interrupts. Journal of the Chinese Institute of Engineers 42(2): 127-131.
[14] Xu Shubin, Jia Zhe and Zhang Haifeng. (2018). Network feature dynamic hiding technology based on SDN. Journal of Communications (S2), 28-34.
[15] Xu Pei and Fu Li. (2016). Software masking scheme to prevent differential power analysis attacks. Computer Application Research (01), 245-248.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.