期刊文献+

针对DES密码芯片的两种功耗攻击对比分析 被引量:3

Comparative Analysis of Two Kinds of Power Attacks on DES Cryptographic Chip
在线阅读 下载PDF
导出
摘要 介绍了差分功耗分析和相关性功耗分析两种方法及其分析流程。以DES算法为研究对象,在自主研发的功耗分析平台上,实现了差分功耗分析攻击和相关性功耗分析攻击。对实验结果的对比分析发现,差分功耗分析对设备噪声不敏感,具有通用分析的能力,而相关性功耗分析具有低样本量的分析能力,对加密设备的威胁更大,但对设备噪声比较敏感。将两者嵌入功耗分析自动检测平台,可发挥两种分析方法各自的优势,提高平台普适性和攻击效率。 Introduced the Differetial Power Analysis(DPA) and Correlation Power Analysis(CPA) methods and their analysis process. According to the DES cryptographic algorithm, realized the DPA attack and CPA attack in the inde- pendent researched and developed power analysis platform. The experiment results analysis shows that the two meth- ods have their own characteristics. DPA is insensitive to device noise with general analysis ability. CPA is a greater threat to the encryption device-with less power consumption but sensitive to device noise. By integrating the two methods in the power anlaysis platform, can greatly improve the attack efficiency and suitability.
出处 《成都信息工程学院学报》 2012年第6期536-540,共5页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 四川省科技支撑计划重点资助项目(2012GZ0017) 成都市高校院所应用成果转化项目(12DXYB340JH-002)对本文的资助
关键词 密码分析 边信道攻击 差分功耗分析 相关性功耗分析 对比分析 cryptography side channel attacks Diffential Power Analysis Correlational Power Analysis compartive analysis
  • 相关文献

参考文献15

  • 1Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential Power Analysis[C]. Lecture Notes In Computer Sci- ence; Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, 1999,1666:388 - 397.
  • 2NBS, Data Encryption Standard. FIPS PUB46 [EB/OL]. National Bureau of Standards. WashingtonD, C., 1977.
  • 3Eric Brier,Christophe Clavier,Francis Olivier. Correlation Power Analysis with a Leakage Model[C]. CHES 2004, LNCS 3156,2004 : 16 - 29.
  • 4Manfred Aigner, Elisabeth Oswald. Power Analysis Tutorial [D]. Institute for Applied Information Processing and Communication University of Technology Graz Inffeldgasse 16a, A-8010 Graz, Austria, 1999.
  • 5Fran, cois-Xavier Standaertl. Power Analysis Attacks Against FPGA Implementations of the DES[J]. J Beck- er, M Platzner, S Vernalde (Eds.): FPL 2004, LNCS 3203,2004,84-94.
  • 6陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 7严迎建,樊海锋,徐金甫,任方.针对DES密码芯片的CPA攻击仿真[J].电子技术应用,2009,35(7):149-152. 被引量:6
  • 8Weibo Pan, William P, Marnane A. Correlation Power Analysis Attack against Tate Pairing on FPGA[J ]. A Koch(Eds. ) :ARC 2011, LNCS 6578,2011,340 - 349.
  • 9Huiyun Li, Keke Wu. Enhanced Correlation Power Analysis Attack on Smart Card[C]. IEEE DOI 10.1109/ ICYCS. 2008. 230.
  • 10Siddika Berna Ors, Frank Gurkaynak, Elisabeth Oswald, et al. Power-Analysis Attack on an ASIC AES im- plementation[C]. In the proceedings of ITCC 2004, Las Vegas, April 2004,5 -7.

二级参考文献13

  • 1张咏,范明钰,王宇飞.对于DES的差分能量分析攻击及其防范对策[J].电子技术应用,2005,31(5):23-24. 被引量:2
  • 2韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 3陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 4KOCHER P, JAFFE J, JUN B. Differential power analysis [A].WIENER M,editor. Advances in Cryptology: Prodeeding of CRYPTO'99[C].Volume 1666 in Lecture Notes in Computer Science, Santa Bartara, California, USA, Springer - August, 1999: 388- 397.
  • 5BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model[A]. JOYE M, QUISQUATER J J, editor. Cryptographic Hardware Embedded System- CHES 2004, USA, Volume 3156 of Lecture Notes in Computer Science, Springer-Verlag, 2004:16-29.
  • 6Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C].Joye M, Quisquater J J.Cambridge,USA: Cryptographic Hardware and Embedded Systems, 2004: 11-13.
  • 7Olivier F.Analysis and protection of hardware block ciphers[C]. Cryptographic Hardware and Embedded Systems, 2007.
  • 8Stefan Mangard,Thomas Popp,Bemdt M Gammel.Side channel leakage of masked CMOS gates[C].Topics in Cryptology-CTRSA 2005,Springer,2005:351-365.
  • 9Christoph Herbst, Elisabeth Oswald, Stefan Mangard. An AES smart card implementation resistant to power analysis attacks [C].ACNS 2006,LNCS 3989,2006:239-252.
  • 10Bertoni Addis, Breveglieri.Side channel attacks to cryptograpic device:differential power analysis on AES S-box[D].MSc Thesis,Politecnico di Milano,2006.

共引文献14

同被引文献24

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.
  • 2Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109.
  • 3Thomas. S. Messerges. Securing the AES Finalists Against Power Analysis Attacks[J ]. In Proceedings of Fast Software Encryption Workshop, Lecture Notes in Computer Science, 2001, 1978: 298- 301.
  • 4Manfred Aigner, Elisabeth Oswald. Power Analysis Tutorial[ D]. Institute for Applied Information Processing and Communication University of Technology Graz Inffeldgasse 16a, A-8010 Graz, Austria, 1999.
  • 5Wvan Eck. Electromagnetic Radiation from Video display Units:An Eves dropping Risk[ J ]. Computers and Se- curity, 1985,4 : 269 - 286.
  • 6Kocher P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]. Ad- vances in Cryptology CRYPTO'96. Springer Berlin Heidelberg, 1996:104 - 113.
  • 7Bar-E1 H, Choukri H, Naccache D, et al. The sorcerer's apprentice guide to fault attacks[J]. Proceedings of the IEEE, 2006, 94(2): 370-382.
  • 8Kocher P, Jaffe J, Jun B. Differential power analysis[ C]. Advances in Cryptology " CRYPTO'99. Springer Berlin Heidelberg, 1999 : 388 - 397.
  • 9Eric Brier, Christophe Clavier, Francis Olivier. Correlation Power Analysis with a Leakage Model [C]. CHES2004, LNCS3156,2004 : 16 - 19.
  • 10国家商用密码管理办公室.无线局域网产品使用用的SMS4密码算法[Z].北京,2006:1-4.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部