We use cookies to improve your experience with our site.

对一类基于中国剩余定理的RSA算法的密码分析

Cryptanalysis of a Type of CRT-Based RSA Algorithms

  • 摘要: 众所周知,中国剩余定理(Chinese Remainder Theorem简称CRT)在密码学中尤其是RSA密码体制中有着广泛的应用,它可以有效提高RSA签名或解密的计算效率。但是基于CRT的RSA密码体制容易受到差错攻击(Fault Attack)。这种攻击主要利用密码设备在运行过程中产生的错误如数据传输过程中产生的短暂错误(Transient Faults)、硬件或软件Bugs、潜在的错误(Latent Faults)和人为外界干扰引入的错误(Induced Faults)等来获取一些机密信息。近年来,一些抵抗差错攻击的算法逐渐被提出,但是这些抵抗算法又逐渐被攻破。因此,如何设计高效且安全的基于CRT的RSA算法成为人们目前关注的问题之一。在CCS 2003上Bl?mer,Otto和Seifert结合Shamir的抗差错攻击思想和“差错计算传播”(Infective Computations)思想,提出一种可抵抗差错攻击的有效CRT-based RSA算法,简称BOS算法。不幸的是,一年后Wagner在CCS 2004上提出了一种针对BOS算法的简单有效的攻击,简称Wagner攻击。为了抵抗Wagner的差错攻击,Liu等人在DASC 2006上提出了一种改进的BOS算法。本文利用这种差错攻击方法分析了BOS算法及其改进的算法。首先,当签名消息m为0或?1时,攻击者可以利用差错分析完全有效地攻破BOS算法及其改进的算法。其次,本文提出了一种新的高效的针对BOS算法的差错攻击方法,这种攻击方法成功的概率大约为25%。最后,本文结合格基规约方法和差错攻击方法提出了一种针对改进的BOS算法在较短公钥情况下的攻击方法。。因此,BOS算法及其改进算法是不安全的。

     

    Abstract: It is well known that the Chinese Remainder Theorem (CRT) can greatlyimprove the performances of RSA cryptosystem in both running times andmemory requirements. However, if the implementation of CRT-based RSA iscareless, an attacker can reveal some secret information by exploitinghardware fault cryptanalysis. In this paper, we present some faultattacks on a type of CRT-RSA algorithms namely BOS type schemesincluding the original BOS scheme proposed by Bl\"omer, Otto, andSeifert at CCS 2003 and its modified scheme proposed by Liu \it et al.at DASC 2006. We first demonstrate that if some special signed messagessuch as m = 0, \pm1 are dealt carelessly, they can be exploited by anadversary to completely break the security of both the BOS scheme andLiu \it et al.'s scheme. Then we present a new permanent fault attackon the BOS scheme with a success probability about 25\%. Lastly, wepropose a polynomial time attack on Liu \it et al.'s CRT-RSA algorithm,which combines physical fault injection and lattice reduction techniqueswhen the public exponent is short.

     

/

返回文章
返回