题名 | Protecting elliptic curve cryptography against memory disclosure attacks |
作者 | |
发表日期 | 2015 |
会议名称 | 16th International Conference on Information and Communications Security, ICICS 2014 |
会议录名称 | Information and Communications Security: 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
![]() |
会议录编者 | Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu |
ISBN | 9783319219653;9783319219660 |
ISSN | 0302-9743 |
卷号 | Lecture Notes in Computer Science (LNCS, volume 8958) |
页码 | 49-60 |
会议日期 | December 16-17, 2014 |
会议地点 | Hong Kong, China |
出版地 | Cham |
出版者 | Springer |
摘要 | In recent years, memory disclosure attacks, such as cold boot attack and DMA attack, have posed huge threats to cryptographic applications in real world. In this paper, we present a CPU-bounded memory disclosure attacks resistant yet efficient software implementation of elliptic curves cryptography on general purpose processors. Our implementation performs scalar multiplication using CPU registers only in kernel level atomatically to prevent the secret key and intermediate data from leaking into memory. Debug registers are used to hold the private key, and kernel is patched to restrict access to debug registers. We take full advantage of the AVX and CLMUL instruction sets to speed up the implementation. When evaluating the proposed implementation on an Intel i7-2600 processor (at a frequency of 3.4GHz), a full scalar multiplication over binary fields for key length of 163 bits only requires 129 μs, which outperforms the unprotected implementation in the well known OpenSSL library by a factor of 78.0%. Furthermore, our work is also flexible for typical Linux applications. To the best of our knowledge, this is the first practical ECC implementation which is resistant against memory disclosure attacks so far. |
关键词 | AVX CLMUL Cold boot attack Efficient implementation Elliptic curve cryptography Memory disclosure attack |
DOI | 10.1007/978-3-319-21966-0_4 |
URL | 查看来源 |
收录类别 | CPCI-S |
语种 | 英语English |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Computer Science, Theory & Methods |
WOS记录号 | WOS:000365045200004 |
Scopus入藏号 | 2-s2.0-84943654842 |
引用统计 | |
文献类型 | 会议论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/13517 |
专题 | 个人在本单位外知识产出 |
通讯作者 | Guan, Zhi |
作者单位 | 1.Institute of Software, School of EECS, Peking University,Beijing,China 2.MoE Key Lab of High Confidence Software Technologies (PKU),Beijing,China 3.MoE Key Lab of Network and Software Security Assurance (PKU),Beijing,China 4.Laboratory of Algorithmics, Cryptology and Security, University of Luxembourg,Walferdange,Luxembourg |
推荐引用方式 GB/T 7714 | Yang, Yang,Guan, Zhi,Liu, Zheet al. Protecting elliptic curve cryptography against memory disclosure attacks[C]//Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu. Cham: Springer, 2015: 49-60. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Yang, Yang]的文章 |
[Guan, Zhi]的文章 |
[Liu, Zhe]的文章 |
百度学术 |
百度学术中相似的文章 |
[Yang, Yang]的文章 |
[Guan, Zhi]的文章 |
[Liu, Zhe]的文章 |
必应学术 |
必应学术中相似的文章 |
[Yang, Yang]的文章 |
[Guan, Zhi]的文章 |
[Liu, Zhe]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论