...
首页> 外文期刊>International journal of parallel programming >Memory Tampering Attack on Binary GCD Based Inversion Algorithms
【24h】

Memory Tampering Attack on Binary GCD Based Inversion Algorithms

机译:基于二进制GCD的反演算法的内存篡改攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In the field of cryptography engineering, implementation-based attacks are a major concern due to their proven feasibility. Fault injection is one attack vector, nowadays a major research line. In this paper, we present how a memory tampering-based fault attack can be used to severely limit the output space of binary GCD based modular inversion algorithm implementations. We frame the proposed attack in the context of ECDSA showing how this approach allows recovering the private key from only one signature, independent of the key size. We analyze two memory tampering proposals, illustrating how this technique can be adapted to different implementations. Besides its application to ECDSA, it can be extended to other cryptographic schemes and countermeasures where binary GCD based modular inversion algorithms are employed. In addition, we describe how memory tampering-based fault attacks can be used to mount a previously proposed fault attack on scenarios that were initially discarded, showing the importance of including memory tampering attacks in the frameworks for analyzing fault attacks and their countermeasures.
机译:在加密工程领域,基于实现的攻击由于其已被证明的可行性而成为主要问题。故障注入是一种攻击手段,是当今的主要研究领域。在本文中,我们介绍了如何使用基于内存篡改的故障攻击来严重限制基于二进制GCD的模块化反演算法实现的输出空间。我们在ECDSA的背景下对提议的攻击进行了框架化,展示了这种方法如何允许仅从一个签名中恢复私钥,而与密钥大小无关。我们分析了两个内存篡改建议,说明了该技术如何适用于不同的实现。除了将其应用于ECDSA之外,还可以扩展到其他加密方案和对策,其中采用了基于二进制GCD的模块化反演算法。此外,我们描述了如何使用基于内存篡改的故障攻击在最初丢弃的方案上进行先前提出的故障攻击,从而说明了在分析故障攻击的框架及其对策中包括内存篡改攻击的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号