期刊文献+

智能卡加密算法的微分能量分析方法研究

Study of Differential Power Analysis on the Cryptographic Algorithm in Smartcards
下载PDF
导出
摘要 DPA是最近几年新发现的一种智能卡攻击方法 ,与以往方法不同 ,它将加密过程中电路能量消耗与操作数关联 ,用统计方法来获取密钥信息 ,危害极大。首先分析了DPA对智能卡常用加密算法的攻击过程 ,对其原理、步骤、特征和实现进行了深入的剖析 ;并对AES候选算法的DPA攻击进行了探讨 ,推论得出 ,新一代分组加密算法也无法抵御DPA攻击。 DPA is a new kind of attack to smartcards in recent years.Different from old methods,it correlates the power consumption in circuits to operand and applies statistics to derive information about key,so it is dangerous. The DPA attack to the usual cryptographic algorithm used in smartcards is analyzed in depth,including its principle,steps,character and realization.The DPA attack to the AES candidate algorithms is discussed,and the conclusion is that the new generation block cipher (can't) resist DPA attack,too.At last,some countermeasures to DPA are given.
出处 《计算机应用研究》 CSCD 北大核心 2004年第8期83-86,共4页 Application Research of Computers
基金 国家自然科学基金重大项目资助 (90 10 4 0 33)
关键词 DPA DES AES 智能卡 DPA DES AES Smartcard
  • 相关文献

参考文献18

  • 1R Mayer- Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards [ C ]. Proceedings of Workshop on Cryptographic Hardware and Embedded, Systems,2000.78- 92.
  • 2Paul Kocher,Joshua Jaffe,Benjamin Jun. Differential Power Analysis [ C ]. Proceedings of Advances in Cryptology ( CRYPTO ' 90 ), Springer-Verlag, 1999. 388- 397.
  • 3Paul Kocher, Joshua Jaffe, Benjamin Jun. Introduction to Differential Power Analysis and Related Attacks [ EB/OL ]. Cryptography Research, http ://www. cryptography. com / dpa / technical / index. html,1998.
  • 4Paul Kocher,Joshua,Jaffe Benjamin Jun. Differential Power Analysis:Leaking Secrets [ C ]. Proceedings of CRYPTO ' 99,1999. 388- 397.
  • 5Thomas S Messerges, Ezzy A Dabbish, Robert H Sloan. Investigations of Power Analysis Attacks on Smartcards [ C ]. USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, 1999.151-162.
  • 6M Aigner, E Oswald. Power Analysis Tutorial [ R ]. Institute for Applied Information Processing and Communication, University of Technology Graz.
  • 7A J Menezes. Elliptic Curve Public Key Cryptosystems [ M ]. Kluwer Academic Publishers, 1993.1-5.
  • 8Jean- Sebastien Coron. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems [ C ]. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag,1999. 398-412.
  • 9FIPS- 197,Advanced Encryption Standard [ S ].
  • 10B Schneier,J Kesley, D Whiting, et al. Twofish: A 128bit Block Cipher[ Z ]. Selected Areas in Cryptography, 1998.27-42.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部