English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 41707599      線上人數 : 2349
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/44566


    題名: 公開金鑰系統之實體密碼分析研究;The Research of Public-Key Cryptosystems Implementations against Physical Cryptanalysis
    作者: 王致尉;Jhih-Wei Wang
    貢獻者: 資訊工程研究所
    關鍵詞: 模指數;實體密碼分析;能量分析攻擊;安全錯誤攻擊法;純量乘法;公開金鑰密碼系統;public-key cryptosystem;modular exponentiation;scalar multiplication;physical cryptanalysis;safe-error attack;power analysis attack
    日期: 2010-07-05
    上傳時間: 2010-12-09 13:49:16 (UTC+8)
    出版者: 國立中央大學
    摘要: 現今許多密碼硬體設備如智慧卡已在日常生活中被廣泛使用,然而,近幾年的研究指出實作不周嚴的密碼系統並無法抵擋實體密碼分析的攻擊。以公開金鑰密碼系統而言,指數與純量乘法演算法分別為實體密碼分析兩個主要的攻擊目標,而由於模指數與純量乘法運算是許多公開金鑰系統的核心運算,因此,這些密碼演算法在實作上是否能對抗實體密碼分析的攻擊開始受到重視。 在本論文的前半部分,我們首先證明Joye在 2009 年所提出之指數運算防禦法會遭受一種強大的能量分析攻擊,並且我們提出兩種較安全的指數運算防禦機制消除Joye防禦法的安全性弱點,此兩種指數運算防禦法在效能上與Joye的防禦法幾乎沒有差異。 而在論文的後半部分,我們將分析由張等人在 2008 年所提出之純量乘法防禦法的安全性。由於張等人的防禦法會遭受記憶體安全錯誤攻擊法(memory safe-error attack)的攻擊,因此,我們提出兩種有效率的純量乘法運算防禦機制抵擋包含記憶體安全錯誤攻擊法在內的數種實體密碼分析攻擊。藉由嚴謹的安全性及效能分析,此兩種純量乘法運算防禦法相較於張等人的防禦法來的更有效率,安全性也較高。Nowadays many cryptographic hardware devices such as smart cards are widely used in our daily lives. However, recent development of physical cryptanalysis points out that the naive implementation of cryptographic algorithms does not provide security anymore. There are two victims of the physical attacks in many public-key cryptosystems: the modular exponentiation and scalar multiplication algorithms. Since both the modular exponentiation and scalar multiplication are the important and main operations in various public-key cryptosystems, much attention has recently been paid regarding the security issues of these algorithms against physical cryptanalysis. In the first half of this thesis, we first introduce Joye's downward exponentiation countermeasure, and then show that Joye's method is still vulnerable to one powerful power analysis attack. Furthermore, we propose two more secure exponentiation countermeasures to eliminate the security weakness of Joye's method. The performance of both improved countermeasures is almost same as Joye's. In the second half of this thesis, we analyze the vulnerability of Zhang et al's scalar multiplication countermeasure under the memory safe-error attack. Then two better countermeasures against physical attacks including memory safe-error attack are proposed. Compared with Zhang et al's countermeasure, two proposed countermeasures both achieve higher security and better performance.
    顯示於類別:[資訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML536檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明