期刊文献+

抗功耗攻击的RSA协处理器 被引量:1

RSA Coprocessor Against Power Attack
在线阅读 下载PDF
导出
摘要 RSA是目前业界最成熟且应用最广泛的非对称加密算法。由于传统RSA加密算法缺乏抗侧信道攻击的结构,极易受到功耗分析等侧信道分析技术的攻击。因此,提出一种抗功耗攻击的RSA协处理器,通过选择指数随机化掩盖和添加伪操作的方法,可有效防御简单功耗分析和差分功耗分析攻击;结合CSA加法器和2层Karatsuba乘法器实现的基256免减Montgomery模乘器,可在不消耗过多面积的前提下有效提升RSA算法的运算速度。实验结果表明:本处理器能够在ASIC和FPGA上实现RSA加解密功能。基于SMIC 130 nm工艺,在100 MHz时钟频率下进行DC综合,结果表明:1024位抗功耗攻击的RSA协处理器吞吐率可达到110 kbit/s,面积约为310 k门。 RSA algorithm is the most mature and widely used asymmetric encryption algorithm in the industry.Because the traditional RSA encryption algorithm lacks the structure of resisting side channel attack,it is vulnerable to the attack of side channel analysis technology such as power analysis.An RSA coprocessor is proposed to resist power consumption attacks.It can effectively defend against simple power consumption analysis and differential power consumption analysis attacks by selecting the method of exponential randomization masking and adding pseudo-operation.Combining the CSA adder and the two-layer Karatsuba multiplier,the base 256 without subtraction Montgomery modulus multiplier can effectively improve the speed of RSA algorithm without consuming too much area.The experimental results show that the processor can realize RSA encryption and decryption on ASIC and FPGA.Based on SMIC 130 nm process and DC synthesis at 100 MHz clock frequency,the results show that the throughput rate of 1024 bit anti-power attack RSA coprocessor can reach 110 kbit/s with an area of about 310 k gates.
作者 蔡梓文 崔超 肖勇 赵云 林伟斌 CAI Ziwen;CUI Chao;XIAO Yong;ZHAO Yun;LIN Weibin(Electric Power Research Institute of China Southern Power Grid,Guangzhou Guangdong 510663,China)
出处 《电子器件》 CAS 北大核心 2021年第4期876-881,共6页 Chinese Journal of Electron Devices
基金 自主高安全计量用电安全芯片关键技术研究项目(ZBKJXM20180014/SEPRI-K185011)。
关键词 RSA 抗功耗攻击 MONTGOMERY模乘 模幂运算 RSA anti power attack Montgomery modular multiplication modular exponentiation
  • 相关文献

参考文献5

二级参考文献34

  • 1曾健林,黄凯,马德,冯炯,葛海通,严晓浪.高速可配RSA加速器设计与实现[J].传感器与微系统,2012,31(6):97-100. 被引量:2
  • 2孙登峰.有限域GF(p)中逆运算的计算机算法[J].信息安全与通信保密,1997,19(4):57-59. 被引量:5
  • 3谭丽娟,陈运.模逆算法的分析、改进及测试[J].电子科技大学学报,2004,33(4):383-386. 被引量:10
  • 4孔凡玉,于佳,李大兴.一种改进的Montgomery模乘快速算法[J].计算机工程,2005,31(8):1-3. 被引量:8
  • 5Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
  • 6Kaliski B S.The Montgomery inverse and its applications[J].IEEE Transactions on Computers,1995,44(8):1064-1065.
  • 7Menezes A J,van Oorschot P C,Vanstone S A.Handbook of applied cryptology[M].New York:CRC Press,1997.
  • 8Knuth D E.The art of computer programming Volume2:seminumerical algorithms[M].2nd ed.Reading,Mass.:Addison-Wesley,1981.
  • 9Savas E,Koc C K.The Montgomery modular inverserevisited[J].IEEE Transactions on Computers,2000,49(7):763-766.
  • 10Stallings W.Cryptography and network security-principles and prictices[M].4th ed.[S.l.]:Pearson Education,2006.

共引文献12

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部