Side-ChannelAttacksonRSAwithCRTRSA与CRT的侧信道攻击

上传人:ra****d 文档编号:252549979 上传时间:2024-11-17 格式:PPT 页数:25 大小:52.50KB
返回 下载 相关 举报
Side-ChannelAttacksonRSAwithCRTRSA与CRT的侧信道攻击_第1页
第1页 / 共25页
Side-ChannelAttacksonRSAwithCRTRSA与CRT的侧信道攻击_第2页
第2页 / 共25页
Side-ChannelAttacksonRSAwithCRTRSA与CRT的侧信道攻击_第3页
第3页 / 共25页
点击查看更多>>
资源描述
,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Side-Channel Attacks on RSA with CRT,Weakness of RSA,Alexander Kozak,Jared Vanderbeck,What is RSA?,As we all know,RSA(Rivest Shamir Adleman)is a really secure algorithm for public-key cryptography.,RSA is known to be suitable for signing as well as encryption.,RSA is believed to be secure given sufficiently long keys and the use of up-to-date implementations.,What is CRT?,The Chinese Remainder Theorem is a result about congruences in number theory and its generalizations in abstract algebra.,The CRT can be used to speed up calculations of many math-based cryptosystems,including RSA.,Montgomery Reduction,Provides an efficient way of multiplying two numbers modulo a number,Makes modulo reduction unnecessary during multiplications,What are Side-Channel Attacks?,“Side Channel Attacks are attacks that are based on Side“Channel Information.,Side channel information is information that can be retrieved from the encryption device.,This information is neither the plaintext or the ciphertext.,What are Side-Channel Attacks?,In the past,an encryption device was perceived as a unit that received plaintext and produces ciphertext and vice versa.,Attacks were based on knowing the ciphertext or knowing both or on the ability to define what plaintext is to be encrypted and then seeing the results of the encryption.,What are Side-Channel Attacks?,Today,it is known encryption devices have additional inputs which are not the plaintext or ciphertext.,Encryption devices produce timing information that is easily measurable,radiation of various sorts,power consumption statistics and more.,What are Side-Channel Attacks?,Often the encryption device also has additional“unintentional inputs such as voltage.,Side channel attacks make use of some or all of this information,along with other cryptanalytic techniques,to recover the key the device is using.,What are Side-Channel Attacks?,Side channel analysis techniques are a concern because the attacks can be mounted quickly and cheaply.,Depending on the type of attack,it can take a short amount of time to attack a card.,For example,with a Simple Power Analysis attack,attacks on smartcards take a few seconds per card.,Timing Attacks,Timing attacks are based on measuring the time it takes for a unit to perform operations.,This information can lead to information about the secret keys.,For example,by measuring the amount of time required to perform private key operations,an attacker might find fixed Diffie-Hellman exponents,factor RSA keys,and break other cryptosystems.,Timing Attacks,Cryptosystems take slightly different amounts of time to process different inputs.,There are various reasons for this,including performance optimizations,branching,RAM cache hits,etc.,Attacks exist which can exploit timing measurements to find the entire key.,Timing Attacks,Computing the variances is easy and provides a good way to identify correct exponent bit guesses.,The number of samples needed to gain enough information are determined by the properties of the signal and the noise.,The more noise there is,the more noise there is,the more samples will be required.,Timing Attacks,These kind of attacks generally require a large amount of samples of timings.,The times are used to perform a statistical analysis on probabilities of each bit in the key.,These probabilities are then used to guess a key.,Timing Attacks,There can be a large amount of error in the signals retrieved by the eavesdropper.,This can be caused by noise(such as latency),blinding,or inaccuracies in data acquisition.,The greater the error,the more samples that are required to determine a key.,CRTs Susceptibility to Timing Attacks,Modular reduction,All arithmetic is performed modulo a number,The computer must compare a value to the modulo number and reduce when necessary,Modular Exponentiation vs.Multiplication,Modular exponentiations and multiplications take different amounts of time and are executed under different circumstances,Any conditional calculations,Calculations executed under certain circumstances,however not all,Montgomery Reductions Susceptibility,After reduction,there is a final modular comparison,This may result in an extra reduction,This extra reduction is executed only when necessary,Causes differences in timing when different values are used,How to Attack CRT,Very simple,Choose values that are very close to one of the prime factors of the public key,When a value is greater than a prime factor,an additional modular reduction will be performed,When the value is less than a prime factor,no additional modular reductions will be performed,This can directly reveal the factors of the public key,How to Attack CRT,Optimized RSA implementations use the Square and Multiply method of computing modular expo
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 商业管理 > 商业计划


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!