期刊文献+
共找到608篇文章
< 1 2 31 >
每页显示 20 50 100
An Improved Simple Power Attack against Camellia's Key Schedule
1
作者 LIU Shuanggen NI Haiying +1 位作者 HU Yupu LIAO Yunyan 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期591-594,共4页
This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power meas... This paper presents an improved simple power attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two types of the simple power attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determinations. In practical applications of the attack, such errors are likely to occur due to noise and distortion in the power measurements and their mapping to the Hamming weights of the data. To resist these attacks, the required design rationale of key schedules and several practical countermeasures are suggested. 展开更多
关键词 simple power attack CAMELLIA key schedule Hamming weight attack
在线阅读 下载PDF
Erratum to: An Improved Simple Power Attack against Camellia's Key Schedule
2
作者 Wuhan University Journal of Natural Sciences 《Wuhan University Journal of Natural Sciences》 CAS 2009年第6期552-552,共1页
Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11... Retraction: LIU Shuanggen, NI Haiying, HU Yupu, LIAO Yunyan. An Improved Simple Power Attack against Camellia's Key Schedule. Wuhan University Journal of Natural Sciences, 2008, 13(5): 591-594. DOI: 10.1007/s 11859-008-0516-3 展开更多
关键词 DOI An Improved Simple power attack against Camellia’s Key Schedule Erratum to
原文传递
Clustering Collision Power Attack on RSA-CRT 被引量:1
3
作者 Wunan Wan Jun Chen +3 位作者 Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期417-434,共18页
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods. 展开更多
关键词 Collision attack power analysis attack chosen-message attack module exponentiation RSA-CRT
在线阅读 下载PDF
Correlation power attack on a message authentication code based on SM3
4
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
原文传递
Research on High Power Inter-Channel Crosstalk Attack in Optical Networks 被引量:1
5
作者 张引发 任帅 +3 位作者 李娟 廖晓闽 李明 方园园 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第1期7-13,共7页
While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is on... While all-optical networks become more and more popular as the basis of the next generation Internet(NGI)infrastructure,such networks raise many critical security issues.High power inter-channel crosstalk attack is one of the security issues which have negative effect on information security in optical networks.Optical fiber in optical networks has some nonlinear characteristics,such as self phase modulation(SPM),cross phase modulation(XPM),four-wave mixing(FWM)and stimulated Raman scattering(SRS).They can be used to implement high power inter-channel crosstalk attack by malicious attackers.The mechanism of high power inter-channel crosstalk attack is analyzed.When an attack occurs,attack signal power and fiber nonlinear refractive index are the main factors which affect quality of legitimate signals.The effect of high power inter-channel crosstalk attack on quality of legitimate signals is investigated by building simulation system in VPI software.The results show that interchannel crosstalk caused by high power attack signal leads to quality deterioration of legitimate signals propagated in the same fiber.The higher the power of attack signal is,the greater the fiber nonlinear refractive index is.The closer the channel spacing away from the attack signal is,the more seriously the legitimate signals are affected by attack.We also find that when attack position and power of attack signal are constant,attack signal cannot infinitely spread,while its attack ability shows a fading trend with the extension of propagation distance. 展开更多
关键词 security of optical networks inter-channel crosstalk attack power of attack signal nonlinear characteristics of optical fiber
原文传递
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
6
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
在线阅读 下载PDF
An Improved Empirical Mode Decomposition for Power Analysis Attack
7
作者 Han Gan Hongxin Zhang +3 位作者 Muhammad Saad khan Xueli Wang Fan Zhang Pengfei He 《China Communications》 SCIE CSCD 2017年第9期94-99,共6页
Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an imp... Correlation power analysis(CPA) has become a successful attack method about crypto-graphic hardware to recover the secret keys. However, the noise influence caused by the random process interrupts(RPIs) becomes an important factor of the power analysis attack efficiency, which will cost more traces or attack time. To address the issue, an improved method about empirical mode decomposition(EMD) was proposed. Instead of restructuring the decomposed signals of intrinsic mode functions(IMFs), we extract a certain intrinsic mode function(IMF) as new feature signal for CPA attack. Meantime, a new attack assessment is proposed to compare the attack effectiveness of different methods. The experiment shows that our method has more excellent performance on CPA than others. The first and the second IMF can be chosen as two optimal feature signals in CPA. In the new method, the signals of the first IMF increase peak visibility by 64% than those of the tradition EMD method in the situation of non-noise. On the condition of different noise interference, the orders of attack efficiencies are also same. With external noise interference, the attack effect of the first IMF based on noise with 15dB is the best. 展开更多
关键词 power ANALYSIS attack EMD IMF CORRELATION power analysis RPIs
在线阅读 下载PDF
Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack
8
作者 Hongxu Yin Rui Xiao Fenfei Lv 《Journal of Power and Energy Engineering》 2015年第4期77-84,共8页
With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both ... With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized. 展开更多
关键词 CYBER attack Electric power INFRASTRUCTURE Information INFRASTRUCTURE DEPENDENCE
在线阅读 下载PDF
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
9
作者 Andrew Masters Vijay K. Madisetti 《Journal of Information Security》 2024年第4期433-447,共15页
The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from ... The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications. 展开更多
关键词 CYBERSECURITY Side Channel attack power Line Communication Penetration Testing Hotplug attack Tool
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
10
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
最新电压毛刺(Power Glitch)攻击与防御方法研究 被引量:5
11
作者 段晓毅 李莉 +1 位作者 武玉华 靳济芳 《计算机科学》 CSCD 北大核心 2011年第B10期428-431,共4页
电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击... 电压毛刺(Power Glitch)攻击是通过快速改变输入到芯片的电压,使得芯片里的某些晶体管受到影响,引起一个或多个触发器进入错误状态,从而导致处理器会跳过或实施错误的操作,使芯片内隐藏的信息随着产生的错误而泄露出来。对电压毛刺攻击与防御技术的最新进展情况进行了综述。在攻击方面,针对攻击目的的不同,详细介绍了RSA-CRT签名运算、RSA非CRT签名运算、对非易失存储器的攻击技术。防御技术分别介绍了电压毛刺检测电路和掩码,并分析了各种防御方案的优缺点。 展开更多
关键词 电压毛刺攻击 智能卡 硬件安全 RSA攻击 存储器攻击
在线阅读 下载PDF
私有算法密码芯片非入侵式攻击检测框架
12
作者 魏淙洺 王菁 +3 位作者 王安 丁瑶玲 孙绍飞 祝烈煌 《软件学报》 北大核心 2026年第2期894-914,共21页
近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提... 近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提出面向私有算法密码芯片的非入侵式攻击检测框架,该框架包含计时分析测试、简单能量/电磁分析测试、差分能量/电磁分析测试3大部分.对于计时分析测试,采用基于平均去噪的计时分析方法,提高所采集时间的可用性.针对简单能量/电磁分析,提出面向私有密码算法的视觉观察法和交叉关联分析方法.针对差分能量/电磁分析,通过TVLA-1和TVLA-2双重检测方法有效检测私有算法密码芯片不同来源的泄露,评估私有算法密码芯片的抗差分能量/电磁攻击能力.该框架是对传统非入侵式攻击检测的有效补充,极大提高了非入侵式攻击检测的检测范围.为了验证该框架的有效性,在多款密码芯片上开展黑盒实验,实验结果表明该框架能够有效检测私有算法密码芯片的抗非入侵式攻击安全性. 展开更多
关键词 非入侵式攻击 私有算法 密码芯片 计时分析 能量分析
在线阅读 下载PDF
考虑潮流和拓扑约束的电力系统虚拟数据注入攻击生成方法
13
作者 凌颖 黎新 +1 位作者 谢铭 董运昌 《电力信息与通信技术》 2026年第1期79-85,共7页
针对传统虚假数据注入攻击将量测值与状态变量间的非线性函数关系近似作为直流模型进行处理,且未考虑交流潮流和不完整拓扑信息的问题,文章提出一种虚拟数据注入攻击(dummy data injection attack,DDIA)生成方法。首先,详细分析交流状... 针对传统虚假数据注入攻击将量测值与状态变量间的非线性函数关系近似作为直流模型进行处理,且未考虑交流潮流和不完整拓扑信息的问题,文章提出一种虚拟数据注入攻击(dummy data injection attack,DDIA)生成方法。首先,详细分析交流状态评估及不良状态检测方法,为后续DDIA生成提供理论依据;其次,提出了计及交流潮流和拓扑约束的DDIA生成方法,并考虑DDIA的虚拟性特征,通过确保量测数据与被攻击数据距离最小的数据点,即可构造被篡改的量测数据;最后,在IEEE 14、IEEE 118和IEEE 300节点系统上进行攻击模拟,结果表明,提出的虚拟数据注入攻击十分隐蔽且对电力系统的稳定运行造成了严重影响。 展开更多
关键词 信息物理系统 虚假数据注入攻击 电力系统 交流潮流 拓扑约束
在线阅读 下载PDF
电力工控网络周期性APT攻击检测方法研究
14
作者 周凯 《自动化应用》 2026年第2期230-232,237,共4页
电力工控网络存在周期性高级持续性威胁(APT)攻击,而强化后的攻击目标常通过单目标判别实现检测,导致检测稳定性降低。为此,提出对电力工控网络周期性APT攻击检测方法。通过引入金字塔机制,提取APT攻击行为特征,增设检测触发机制,放大... 电力工控网络存在周期性高级持续性威胁(APT)攻击,而强化后的攻击目标常通过单目标判别实现检测,导致检测稳定性降低。为此,提出对电力工控网络周期性APT攻击检测方法。通过引入金字塔机制,提取APT攻击行为特征,增设检测触发机制,放大攻击行为特征,实现强化处理。采用多阶段判别标识的方法,在周期性范围内建立目标映射,以强化后的目标作为映射点,实现攻击检测范围覆盖,判别攻击类型,标识攻击位置。采用标识目标近似归约匹配的方式,在电力工控网络更新后,同步匹配与APT类型相同的攻击点,实现同步检测。实验结果表明,所提方法得出的AUC值在1.2~1.4,具有极强的稳定性,检测性能明显提高。 展开更多
关键词 电力工控 电网 周期性 APT攻击 攻击检测 异常识别
在线阅读 下载PDF
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
15
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
A Unified Method Based on SPA and Timing Attacks on the Improved RSA 被引量:1
16
作者 JIA Fan XIE Di 《China Communications》 SCIE CSCD 2016年第4期89-96,共8页
Nowadays the modular multiplications in many kinds of smartcards are utilized Montgomery's algorithm modular multiplier, so traditional SPA to RSA becomes invalid. An improved attack method is proposed based on SP... Nowadays the modular multiplications in many kinds of smartcards are utilized Montgomery's algorithm modular multiplier, so traditional SPA to RSA becomes invalid. An improved attack method is proposed based on SPA which just depends on the fact that there exist some subtle differences in each loop during the operation of cd mod n. At same time, compared with the traditional SPA, it doesn't need to select the clear text or some known message. Using this method, attacks can easy to discover the mode of RSA implementation and extract the bits of decryption key just based on a few collected traces. From the real attack test on several main kinds of smartcard, the private keys of RSA stored inside can be analyzed successfully. 展开更多
关键词 power analysis SPA RSA attack SCA
在线阅读 下载PDF
基于攻击图的电力网络安全风险度量方法 被引量:3
17
作者 向勇 张硕 常星 《计算机工程与设计》 北大核心 2025年第1期88-96,共9页
为在不影响不影响生产前提下对电力网络安全进行定量评估,研究一种基于模板构建电力网络分区式攻击图模型的方法。预定义网络拓扑模板和漏洞模板,将电力网络攻击图分区构建。在此基础上,提出一种定量分析方法和最大可能攻击路径预测方... 为在不影响不影响生产前提下对电力网络安全进行定量评估,研究一种基于模板构建电力网络分区式攻击图模型的方法。预定义网络拓扑模板和漏洞模板,将电力网络攻击图分区构建。在此基础上,提出一种定量分析方法和最大可能攻击路径预测方法。根据设备的重要性、分区的安全等级、设备在网络中的影响以及操作系统版本,计算设备节点的威胁级别。通过考虑跨域次数和攻击路径长度,确定最大可能攻击路径。实验验证了方法的有效性和全面性。 展开更多
关键词 网络安全 电力系统 攻击图 安全度量 最大可能攻击路径 安全分区 漏洞评分
在线阅读 下载PDF
Optimal Power System Restoration and Reconfiguration in Distribution Circuit Using BFAM and BPSO
18
作者 K. Sathish KUMAR T. JAYABARATHI 《Journal of Electromagnetic Analysis and Applications》 2009年第3期163-169,共7页
This paper approaches the problem of restoring a faulted area in an electric power distribution system after locating and isolating the faulted block and reconfiguring the system. Through this paper we are going to ex... This paper approaches the problem of restoring a faulted area in an electric power distribution system after locating and isolating the faulted block and reconfiguring the system. Through this paper we are going to explain the power system restoration technique using brute-force attack method (BFAM) and binary particle swarm optimization (BPSO). This is a technique based on the possible combination in mathematical analysis which is explained in the introduction. After isolating the fault, main concentration will be towards the reconfiguration of the restored system using BPSO. Here due to fault in the system near-by agent will be affected and become useless and will go in the non-working mode. Now in order to restore these near-by loads we will give a new connection called NO (Normally Open. Using these switch system will be restored with power availability. After restoration using the BFAM, the BPSO will be used in order to provide the stable configuration. The output of the BFAM will be used as input for the BPSO and then we will reconfigure our system in order to provide the stable configuration. The effectiveness of the proposed BFAM and BPSO is demonstrated by simulating tests in a proposed distribution network and verified the results using the Matlab and C programming. 展开更多
关键词 Brute-Force attack Method power System Restoration and Particle SWARM Optimization
暂未订购
针对物联网设备的旁路攻击及防御方法的研究 被引量:6
19
作者 何乐生 冯毅 +2 位作者 岳远康 杨崇宇 胡崇辉 《通信学报》 北大核心 2025年第2期166-175,共10页
物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提... 物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提出了安全密钥管理方案及改进的S盒设计,作为旁路攻击防御方法。验证平台由两级差分放大器和抗干扰有限冲激响应(FIR)滤波器构成,能够捕捉微弱的功耗变化,并设计了针对轻量级加密算法的两轮相关能量攻击。通过获取正确密钥相关系数置信度的评估方法,在对PRESENT算法的3 000条功耗曲线进行10 000次攻击后,成功率超过96%,正确密钥的相关性均值均超过0.6,在95%的置信水平下,拥有狭窄的置信区间,而采用改进后的算法进行相同实验时,攻击成功率仅为9.12%。 展开更多
关键词 物联网安全 轻量级密码 旁路攻击 相关能量分析
在线阅读 下载PDF
基于DyCML的改进型三阶段抗功耗攻击型D触发器
20
作者 姚茂群 李聪辉 +1 位作者 李海威 陈冉 《浙江大学学报(理学版)》 北大核心 2025年第4期424-430,共7页
功耗攻击是一种通过统计电路的功耗信息得到敏感数据信息的攻击手段。作为电路的重要组成单元,触发器的抗功耗攻击水平与电路的安全性能息息相关,为此提出一种抗功耗攻击型触发器。通过引入“预充电-求值-放电”三阶段逻辑,提出了改进... 功耗攻击是一种通过统计电路的功耗信息得到敏感数据信息的攻击手段。作为电路的重要组成单元,触发器的抗功耗攻击水平与电路的安全性能息息相关,为此提出一种抗功耗攻击型触发器。通过引入“预充电-求值-放电”三阶段逻辑,提出了改进型的三阶段动态电流模式逻辑D触发器(improved three-phase dynamic current mode logic-based D flip-flop,TDyCML_FF),避免了因负载电容不均衡引起的电路功耗不恒定等安全问题。同时对三阶段逻辑结构进行了改进,由电路内部节点信号生成放电信号,从而避免通过减缓时钟频率或消除放电信号对其进行攻击,提高了电路的抗功耗攻击性能。通过Hspice仿真实验,并引入归一化能量偏差(NED)和归一化标准偏差(NSD)2个量化参数,将TDyCML_FF感应放大逻辑触发器(SABL_FF)、三阶段双轨预充电逻辑触发器(TDPL_FF)等抗功耗攻击型触发器进行了对比,证明TDyCML_FF具有较高的抗功耗攻击性能。 展开更多
关键词 三阶段逻辑 侧信道攻击 功耗攻击 触发器设计
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部