期刊文献+

密码芯片电磁信息泄漏评估方法研究 被引量:1

Research on Method of Electromagnetic Information Leakage Evaluation for Cipher Chip
在线阅读 下载PDF
导出
摘要 基于半定制集成电路设计流程,提出一种对CMOS集成电路进行电磁信息泄漏评估的方法。该方法首先利用综合工具生成电路的门级网表,将门级网表中的普通单元替换为防护逻辑单元,然后利用电磁辐射仿真模型和电磁信息泄漏评估模型对集成电路进行电磁辐射仿真和信息泄漏分析。该方法能够在设计阶段对密码芯片的抗电磁旁路攻击能力进行评估,可提高密码芯片的设计效率,减少资源浪费。 A method was proposed to evaluate the electromagnetic information leakage of CMOS ICs based on the design flow of semi-custom IC.This method gets the gate netlist first with the synthesis tools,then the common cell of the netlist is replaced by defending logic cell.After that,the electromagnetic information leakage of ICs is evaluated with the simulation model and electromagnetic information leakage evaluation model.With this method,the designer is able to evaluate the capability against electromagnetic side channel attack on cipher chip at the designing stage.So,this method can improve the efficiency and reduce the resources when designing the cipher chip
出处 《军械工程学院学报》 2011年第2期22-25,共4页 Journal of Ordnance Engineering College
关键词 密码芯片 侧信道攻击 电磁信息泄漏评估 CMOS集成电路 cipher chip(CC) side channel attack(SCA) electromagnetic information leakage evaluation(EILE) CMOS integrated circuit(CMOS IC)
  • 相关文献

同被引文献13

  • 1Hadi M, Erfan K M, Behazd K, et al. An efficient algorithm resistant to SPA and DPA variants in ECC [C]. IFIP Wireless Days, 2008.
  • 2Osvik D A, Shamir A, Tromer E. Cache attacks and counter- measures: The case of AES [G]. LNCS 3860: 2006: 1- 20.
  • 3LI W, GU D W, LI J R. Differential fault analysis on the ARIA algorithm [J ]. Information Sciences, 2008, 178 ( 19 ) 3727- 3737.
  • 4Bog danov A, Knudsen L R, Leander G, et al. PRESENT: An ultra lightweight block cipher [G]. LNCS 4727: Proc Work- shop Cryptographic Hardware and Embedded Systems, 2007: 450- 466.
  • 5LI Huiyun, Markettos A T, Moore S. Security evaluation against electromagnetic analysis at design time [C]. Interna- tional Conference on Cryptographic Hardware and Embedded System, 2005: 183-188.
  • 6Kopf B, Basin D. An information-theoretic model for adaptive side-channel attacks [C]. Proceedings of ACM CCS, 2007~ 286-296.
  • 7peters E, Standaert F X, Quisquater J J. Power and electro- magnetic analysis-improved model consequences and compari- sons [J]. Integration the VLSI Journal, 2007 40 (1): 52-60.
  • 8周永彬,徐秋亮.侧信道攻击理论与技术.中国密码学发展报告2008[M].北京:电子工业出版社,2009:191-259.
  • 9Tiri K, Hwang D. A side-channel leakage free coprocessor IC in 0. 18urn CMOS for embedded AES-based cryptographic and biometric processing[C]. Proc ACM/IEEE Design Automa- tion Conference, 2005: 222- 227.
  • 10Jianbo Y, Tao Z. Hardware/software codesign to secure cryp- to-chip from side channel analysis at design time [C]. 3rd IEEE International Conference on Computer Science and Infor- mation Technology, 2010: 88-91.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部