期刊文献+

功耗分析平台中混合编程的应用研究 被引量:3

Approach on Hybrid Programming Technique Applied in Power Analysis Attack System
下载PDF
导出
摘要 功耗分析平台是有效实施功耗分析攻击的工具,需要服务器与示波器等多种外设进行通信,同时还需要处理大量高维数组并且要求有良好的可操作性,如果采用单一编程语言来开发,则存在功耗分析攻击效率较低的问题。针对该问题,提出了一种新的解决方法,将Java、C++和Matlab这3种编程语言结合,在功耗波形采集、波形特征处理等方面采用混合编程技术进行开发,充分发挥这3种编程语言各自的优势。实验结果表明,在保证功耗分析攻击准确率的基础上,攻击的效率比采用单一语言编程时提高了30%以上。 Power analysis system is the right tool for power analysis attack.To accomplish the attacks properly,it needs the PC server communicates with different types of peripheral devices such oscilloscope.And it requires to disposal of mass of high dimension arrays with good operation-ability.Programming with unique programming language would lead to deficiency of power analysis attack.A new method was proposed by hybrid programming of Java,C++ and Matlab,which took the advantages of all these languages.Experiments showed that more than 30% attack efficiency increased and with no accuracy deficiency by using our method.
出处 《成都信息工程学院学报》 2011年第2期127-131,共5页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 四川省科技支撑计划重点项目(2011GZ0170)
关键词 功耗分析攻击 攻击效率 混合编程 JAVA C++ MATLAB power analysis attack attack efficiency hybrid programming Java C++ Matlab
  • 相关文献

参考文献6

二级参考文献24

共引文献31

同被引文献33

  • 1王洪,顾本斗.USB设备开发实例[J].电子产品世界,2001,8(19):62-64. 被引量:8
  • 2饶金涛,陈运,吴震,陈俊,许森.一种抗简单功耗分析攻击的模幂算法[J].成都信息工程学院学报,2011,26(2):123-126. 被引量:2
  • 3KOCHER P.Timing attacks On implementations of diffe-hellman,RSA,DES,and other system[A].Proceed-ings of Advances in Cryptology-CRYPTO’96[C],1996:104-113.
  • 4DHEM J F.KOEUME F,LEROUX P A,et al.A practical implementation of the timing attack[A].Proceed-ings of CARDIS 1998[C].1998:14-16.
  • 5MESSERGES T S,DABBISH E A,SLOAN R H.Investigations of power analysis attacks on smarteards[A].Proc USENIX Workshop Smarteard Technology[C].Chicago,Illinois,USA,1999:151-161.
  • 6KOCHER P,JAFFE J,JUN B.Differential power analysis[A].Proceedings of Advances in Cryptology-CRYPTO’99[C].1999:388-397.
  • 7Suresh Chari,Josyula R.Rao,and Pankaj Rohatgi.Template Attacks[A].CHES 2002,LNCS 2523,2003:13-28.
  • 8C.Archambeau,E.Peters et al.Template Attacks in Principal Subspaces[A].CHES 2006,LNCS 4249,2006:1-14.
  • 9Francois-Xavier Standaert et al.and Cedric Archambeau.Using Subspace-Based Template Attacks to Com-pare and Combine Power and Electromagnetic Information Leakages[A].CHES 2008,LNCS 5154,2008:411-425.
  • 10O Acicmez,J P Seifert,C K Koc.Predicting secret keys via branch prediction[J].Topics in Cryptology-CT-RSA 2007.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部