期刊文献+

面向NFC应用的DES/3DES算法研究与仿真实现 被引量:7

Research and Simulation of DES/3DES Algorithm for NFC Applications
下载PDF
导出
摘要 在分析DES/3DES密码算法及常用抗攻击策略的基础上,从DES算法的功耗点和代码的简易程度着手,进一步改进掩膜方法,提出了一种抗DPA攻击的DES/3DES改进算法,该算法可支持ECB和CBC工作模式。利用SystemC建立算法模型并进行验证,完成了满足NFC应用要求的DES/3DES密码协处理器的设计和仿真;建立了一套SystemC算法模型和RTL电路自动仿真系统,以减少开发周期及研发成本。对改进算法及电路所做的仿真验证了电路的有效性。 Based on analysis of DES/3DES cryptographic algorithms and anti-attack strategy,an improved anti-DPA attack DES/3DES algorithm supporting both ECB and CBC modes was proposed by further improving the mask method from power points and easy working code.The algorithm and its validation model were established by using SystemC.A DES/3DES cryptographic coprocessor satisfying the requirements of NFC applications was designed and simulated.In order to reduce the development cycle and costs,a set of automatic simulation system with SystemC model and RTL circuit was set up.Simulation results demonstrated the effectiveness of the proposed algorithms and circuit designs.
出处 《微电子学》 CAS CSCD 北大核心 2013年第1期134-138,共5页 Microelectronics
基金 上海市教委重点项目(12ZZ083)
关键词 DES 3DES算法 抗DPA攻击 近场通讯 掩膜 DES/3DES algorithms Anti-DPA attack NFC Mask
  • 相关文献

参考文献10

二级参考文献46

  • 1Kocher PC. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Neal Koblitz, ed. Proc. of the Advances in Cryptology--CRYPTO'96. LNCS 1109, London: Springer-Verlag, 1996. 104-113.
  • 2Kocher P, Jaffe J, Jun B. Differential power analysis. In: Wiener MJ, ed. Proc. of the Advances in Cryptology--CRYPTO'99. LNCS 1666, Berlin: Springer-Verlag, 1999. 388-397.
  • 3Tiri K, Hwang D, Hodjat A, Lai BC, Yang SL, Schaumont P, Verbauwhede I. Prototype IC with WDDL and differential rounting--DPA resistance assessment. In: Joye M, ed. Proc. of the Cryptographic Hardware and Embedded Systems. LNCS 3659, Berlin: Springer-Verlag, 2005. 354-365.
  • 4Zhou YB, Feng DG. Side channel attacks: 10 years after its publication and the impact on cryptographie module security testing. 2005. http://eprint.iacr.org/2005/388
  • 5Oswald E. An efficient masking scheme for AES software implementations. In: Song J, Kwon T, Yung M, eds. Proc. of the Information Security Applications. LNCS 3786, Berlin: Springer-Verlag, 2006. 292-305.
  • 6Wu WL, He YP, Feng DG, Qing SH. Power attack of Mars and Rijndael. Journal of Software, 2002,13(4):532-536 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/13/532.pdf
  • 7Bucci M, Luzzi R, Guglielmo M, Trifiletti A. A countermeasure against differential power analysis based on random delay insertion. In: Proc. of the IEEE Int'l Symp. on Circuits and Systems. 2005.23-26.
  • 8Mangard S. Hardware countermeasures against DPA-A statistical analysis of their effectiveness. In: Okamoto T, ed. Proc. of the CT-RSA 2004. LNCS 2964, Berlin: Springer-Verlag, 2004. 222-235.
  • 9Oswald E, Mangard S, Herbst C, Tillich S. Practical 2nd-order DPA attacks for masked smartcard implementations of block ciphers. In: Pointcheval D, ed. Proc. of the CT-RSA 2006. LNCS 3860, Berlin: Springer-Verlag, 2006. 192-207.
  • 10Oswald E, Mangard S. Template attacks on masking--Resistance is futile. In: Abe M, ed. Proc. of the CT-RSA 2007. Berlin: Springer-Verlag, 2007.12-27.

共引文献32

同被引文献57

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部