QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 1989|回复: 2
打印 上一主题 下一主题

每日科技报告 第34期 Weakness Discovered in Common Digital Security System

[复制链接]
字体大小: 正常 放大

525

主题

10

听众

4072

积分

升级  69.07%

  • TA的每日心情
    奋斗
    2015-1-3 17:18
  • 签到天数: 6 天

    [LV.2]偶尔看看I

    自我介绍
    学习中!

    优秀斑竹奖 元老勋章 新人进步奖 最具活力勋章

    群组Matlab讨论组

    群组C 语言讨论组

    群组每天多学一点点

    群组数学趣味、游戏、IQ等

    群组南京邮电大学数模协会

    跳转到指定楼层
    1#
    发表于 2010-3-5 21:51 |只看该作者 |倒序浏览
    |招呼Ta 关注Ta
    本帖最后由 sea_star666 于 2010-3-5 21:55 编辑

    The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.

    RSA authentication is a popular encryption method used in media players, laptop computers, smartphones, servers and other devices. Retailers and banks also depend on it to ensure the safety of their customers' information online.
    The scientists found they could foil the security system by varying the voltage supply to the holder of the "private key," which would be the consumer's device in the case of copy protection and the retailer or bank in the case of Internet communication. It is highly unlikely that a hacker could use this approach on a large institution, the researchers say. These findings would be more likely to concern media companies and mobile device manufacturers, as well as those who use them.
    Andrea Pellegrini, a doctoral student in the Department of Electrical Engineering and Computer Science, will present a pa-per on the research at the upcoming Design, Automation and Test in Europe (DATE) conference in Dresden on March 10.
    "The RSA algorithm gives security under the assumption that as long as the private key is private, you can't break in unless you guess it. We've shown that that's not true," said Valeria Bertacco, an associate professor in the Department of Electrical Engineering and Computer Science.
    These private keys contain more than 1,000 digits of binary code. To guess a number that large would take longer than the age of the universe, Pellegrini said. Using their voltage tweaking scheme, the U-M researchers were able to extract the private key in approximately 100 hours.
    They carefully manipulated the voltage with an inexpensive device built for this purpose. Varying the electric current essentially stresses out the computer and causes it to make small mistakes in its communications with other clients. These faults reveal small pieces of the private key. Once the researchers caused enough faults, they were able to reconstruct the key offline.
    This type of attack doesn't damage the device, so no tamper evidence is left.
    "RSA authentication is so popular because it was thought to be so secure," said Todd Austin, a professor in the Department of Electrical Engineering and Computer Science. "Our work redefines the level of security it offers. It lowers the safety assurance by a significant amount."
    Although this pa-per only discusses the problem, the professors say they've identified a solution. It's a common cryptographic technique called "salting" that changes the order of the digits in a random way every time the key is requested.
    "We've demonstrated that a fault-based attack on the RSA algorithm is possible," Austin said. "Hopefully, this will cause manufacturers to make a few small changes to their implementation of the algorithm. RSA is a good algorithm and I think, ultimately, it will survive this type of attack."
    The pa-per is titled "Fault-based Attack of RSA Authentication." This research is funded by the National Science Foundation and the Gigascale Systems Research Center.
    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
    第一次用linux登录madio,纪念一下

    525

    主题

    10

    听众

    4072

    积分

    升级  69.07%

  • TA的每日心情
    奋斗
    2015-1-3 17:18
  • 签到天数: 6 天

    [LV.2]偶尔看看I

    自我介绍
    学习中!

    优秀斑竹奖 元老勋章 新人进步奖 最具活力勋章

    群组Matlab讨论组

    群组C 语言讨论组

    群组每天多学一点点

    群组数学趣味、游戏、IQ等

    群组南京邮电大学数模协会

    本帖最后由 sea_star666 于 2010-3-5 21:58 编辑

    沙发当然是我的!
    The mission of the GigaScale Systems Research Center (GSRC) is to address the research challenges in the design (hardware and software) and utilization (programming and inter-facing) of information system platforms for consumer/enterprise/defense applications, to be deployed in the late- and post-silicon era, so as to achieve orders of magnitude improvement in cost (design and related NRE, programming) and quality (lower power, higher functional performance, increased reliability, increased usability).
    第一次用linux登录madio,纪念一下
    回复

    使用道具 举报

    ljiangbig 实名认证       

    5

    主题

    4

    听众

    290

    积分

    升级  95%

    该用户从未签到

    自我介绍
    做人得专一。

    新人进步奖

    回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2024-6-17 21:42 , Processed in 0.488650 second(s), 62 queries .

    回顶部