期刊文献+

DPA方法对加密系统的FPGA旁路攻击研究 被引量:6

Study of Differential Power Analysis Attacks on FPGA Based Encrypted System
下载PDF
导出
摘要 差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息.以DPA攻击嵌有DES算法的芯片为例,论述了搭建实验平台,获取功率消耗数据并用统计学和密码分析学的方法推导分析得出结论,从而成功破解加密系统. The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information. The technique will play the important role in breaking the core of device - integration circuitry chip successfully. Taking DPA attack on chip with DES as example, the thesis discusses building experiment roof, obtaining power consume and educing conclusion by statistics and cryptanalysis, accordingly breaking encrypted system successfully.
出处 《军械工程学院学报》 2006年第2期51-54,共4页 Journal of Ordnance Engineering College
基金 国家自然科学基金资助项目(60571037)
  • 相关文献

同被引文献33

  • 1李少平,肖庆中.CMOS存储器IDD频谱图形测试[J].电子产品可靠性与环境试验,2004,22(4):50-52. 被引量:3
  • 2赖坤锋.智能卡SPA&DPA攻击[J].现代电子技术,2005,28(17):28-29. 被引量:3
  • 3周文锦,范明钰.基于掩码的差分能量分析攻击防范对策[J].计算机应用,2005,25(12):2725-2726. 被引量:2
  • 4孙海涛,赵强,刘洁.集成电路加密芯片功耗泄漏分析[J].科学技术与工程,2006,6(21):3480-3482. 被引量:4
  • 5陈开颜,赵强,张鹏,邓高明.数据加密标准旁路攻击差分功耗仿真分析[J].计算机测量与控制,2007,15(2):222-223. 被引量:7
  • 6PAUL C KOCHER, JOSHUA JAFFE, BENJAMIN JUN. Differential Power Analysis [ C ] //19th Annual International Cryptology Conference. California, USA: Springer-Verlag, 1999: 388-397.
  • 7THOMAS S MESSERGES, EZZYAT A DABBISH, ROBERT H SLOAN. Examining Smart Card Security under the Threat of Power Analysis Attacks [J]. IEEE Transactions on Computers, 2002, 51 (5) : 541-552.
  • 8STEFAN MANGARD. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion [ C ] //Information Security and Cryptology-ICISC2002. Seoul, Korea: Springer-Verlag, 2002 : 343-358.
  • 9DENNIS VERMOEN, MARC WITTEMAN, GEORGI N GAYDADJIEV. Reverse Engineering Java Card Applets Using Power Analvsis[ C ] //International Federation for Information Processing 2007. Crete, Greece: Springer-Verlag, 2007 : 138-149.
  • 10STEFAM MANGARD, NORBERT PRAMSTALLER, ELISABETH OSWALD. Successfully Attacking Masked AES Hardware Implementation [ C] //Cryptographic Hardware and Embedded Systems -CHES 2005. Edinburgh, UK: Springer-Verlag, 2005 : 157-171.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部