通过对8051芯片(支持I SO7816协议)上RSA算法功耗曲线进行大量测试观察,发现传统模幂运算二元表示算法分支语句存在指数信息的泄露.针对这一缺陷,首先尝试基于分支语句时间序列的先验模板攻击方法,实验表明传统的先验模板准确率只有85%左右.通过对匹配错误数据的深入分析,发现传统先验模板攻击的局限性,继而提出了基于SDPA时序模板攻击方法.新方法模拟真实待测环境构建模板,消除了先验模板攻击中因指数不同造成的相同模板间的差异,有效地提高了攻击的准确性.实验验证新方法的攻击正确率达到100%.
Testing results about power traces of RSA algorithm on 8051 chip with ISO 7816 protocol show that the traditional modular exponentiation Binary Representation method has the information leakage defect when the branch execution. Then, we tried the prior template attack method based on sequential branch execution to achieve the at- tack success rate to 85 %. After carefully analyzed the mismatch data, we represented the new SDPA based sequential template attack method. The new method accurately simulates the target circumstance template and eliminates the differences induced by templates' prior factors chosen. The experimental results show the SDPA method can make the attack 100% successful.