期刊文献+

针对密码芯片的电磁模板分析攻击 被引量:7

EM Template Analysis for Cipher Chips
在线阅读 下载PDF
导出
摘要 给出一种简单的电磁信号的获取办法,说明密码芯片的电磁信号能够用一个手工绕制的金属线圈获取,并且其信号幅度和操作数的汉明重量相关.在描述模板攻击原理和步骤的基础上,介绍了针对密码芯片的电磁模板分析攻击,并且针对一个单片机(AT89C52)上实现的DES密码系统进行了电磁模板分析攻击实验,实验成功恢复了DES第16轮使用的48位子密钥. In this paper, it is shown that the electromagnetic (EM) emanation of cryptographic chips could be captured easily with a handmade loop probe, and its amplitude is related to the hamming weight of the related operands. Based on the description of the principle and steps of template analysis, EM template analysis attack against cryptographic chips was introduced. Additionally, an experiment of EM template analysis attack against a singlechip (AT89C52) implemented DES was given, and the 48-bit subkey used in the 16th round of DES was recovered.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第1期1-4,8,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60571037) 国家"八六三"计划项目(2007AA01Z454)
关键词 电磁 模板分析 密码芯片 DES EM template analysis cryptographic chips DES
  • 相关文献

参考文献8

  • 1Paul Kocher. Timing attacks on implementations of diffe - hellman, RSA, DSS, and other systems[ C] // Advances in Cryptography; Proceedings of Crypto '96. New York, Springer- Verlag, 1996.
  • 2张鹏,陈开颜,赵强.PDA上ECC电磁分析神经网络分类方法[J].微电子学与计算机,2006,23(11):137-139. 被引量:1
  • 3邓高明,张鹏,陈开颜,赵强.Cache在旁路攻击中的理论应用及其仿真实现[J].微电子学与计算机,2007,24(5):76-79. 被引量:5
  • 4Suresh Chaff, Josyula R Rao, Pankaj Rohatgi. Template attacks[ C] // Cryptographic Hardware and Embedded Systems(CHES 2002). Berlin: Springer- Verlag, 2002:13- 28.
  • 5Agrawal D, Rao J R, Rohatgi P, et al. Templates as master keys[ C]//Cryptcgraphic Hardware and Embedded Systems(CHES 2005). Edinburgh: Springer, 2005:15 - 29.
  • 6Francois- Xavier Standaert, Cedric Archambeau. Using subspace- based template attacks to compare and combine power and electromagnetic information leakages [ C ]// Cryptographic Hardware and Embedded Systems (CHES 2008). Berlin: Springe, 2008:411-425.
  • 7International Electrotechnical Commission. IEC 61967: integrated circuits - measurement of electromagnetic emanations, 150 kHz to 1 GHz[S]. New York: IEC, 2003.
  • 8Raymond A Serway, John W Jewett. Physics for scientists and engineers[ M]. 6th ed. Saunders: Satmders college publishing, 2003.

二级参考文献7

  • 1陈玮,肖梁.改进椭圆曲线加密算法抗边际信道攻击的研究[J].微电子学与计算机,2004,21(10):86-89. 被引量:1
  • 2谢满德.嵌入式CPU设计中Cache性能的全局优化[J].微电子学与计算机,2005,22(2):143-147. 被引量:3
  • 3J J Quisquater,D Samyde.Electro magnetic analysis (EMA) measures and counter-measures for smart cards,in I.Attali and T.Jensen,editors,E-Smart Smartcard Programming and Security,Lecture Notes in Computer Science,Springer-Verlag 2001,2140:200~210
  • 4Silverman J.The arithematic of elliptic curves.New York:Springer-Verlag,1986
  • 5MathWorks,Online MATLAB documentation,April 2005,http://www.mathworks.com/access/helpdesk/help/helpdesk.html.
  • 6Daniel Page.Theoretical use of cache memory as a cryptanalytic side-channel[EB/OL].URL:http://eprint.iacr.org/2002/169/
  • 7Hill M D.Aspects of cache memory and instruction buffer performance[R].Technical Report CSD-87-381,University of California,Berkeley,November 1987

共引文献4

同被引文献40

  • 1梅长林.实用统计方法[M].北京:科学出版社,2006:117-120.
  • 2Paul Koeher. Timing attacks on implementations of dif- fie-bellman, RSA, DSS, and other systems[C]//Pro- ceedings Crypto '96, LCNS. New York:Springer-Ver- lag, 1996:104-113.
  • 3Martin Goldack. Side-channel based reverse engineer- ing for microcontrollers [D]. Bochum: Ruhr- Universi- ty, 2008.
  • 4Dennis Vermoen. Reverse engineering of Java card ap- plets using power analysis [D]. Netherlands: TU Delft, 2007.
  • 5Jan M Rabaey, Anantha Chandrakasan, Borivoje Nikoli.数字集成电路-电路、系统与设计[M].2版.周润德,译.北京:电子工业出版社,2004:141-166.
  • 6SungMo Kang,Yusuf Leblebiei.CMOS数字集成电路-分析与设计[M].3版.王志功,窦建华,译.北京:电子工业出版社,2005:97-98.
  • 7Paul Kocher. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]// Neal Koblitz. Advances in Cryptology, Proceedings Crypto 96, LCNS. New York: ACM, 1996:104-113.
  • 8Chari S, Rao J R, Rohatgi P. Template attacks[C]// Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'03) . Cologne, Germa- ny: Computer Science, 2003:13-28.
  • 9Dennis Vermoen. Reverse engineering of Java Card appiers using power analysis [D]. Netherlands:TU Delft, 2007.
  • 10Sung-MoKang,YusufLeblebici.CMOS数字集成电路一分析与设计[M].王志功,窦建华,译.北京:电子工业出版社,2005:97-98.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部