为获取真实硬件上实现的公钥密码密钥信息,提出了实用功耗分析模型,并归纳出指数信息提取的信息处理方法;利用自主设计实现的功耗分析平台获取了幂剩余算法功耗轨迹图,成功提取出其32bit指数信息;推翻了Messerges等关于使用SPA攻击难以在真实硬件环境下直接获取RSA密钥信息的论断;此外,还验证了静态掩盖算法抗SPA攻击的有效性。
A power analysis model on modulo exponentiation's computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough. And a method of signal processing for extracting exponential information from the initial power traces was inferred too. Hereby, a power analysis platform was designed and implemented. The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after. Meanwhile, a conclusion about SPA attack on RSA made by Messerges et al, such as the problem with an SPA attack was that the information about the secret key was difficuJt to directly observe, was proved to be incorrect. Finally, the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.