期刊文献+

集成电路加密芯片功耗泄漏分析 被引量:4

Scaling and Evaluation of Cryptographic Devices Power Consumption
下载PDF
导出
摘要 不同于传统的密码分析技术,旁路密码分析技术利用加密设备工作时泄漏的各种旁路信息进行密码攻击。说明了加密芯片功率泄露机理,提出了功率泄露模型,并在此基础上重点研究了差分功率分析技术。 Different from traditional cryptographic analysis technology, side-channel analysis uses information that leaking in the cryptographic device implementations to do achieve the secret keys. The power-leaking mechanism is described of cryptographic device, proposed a power consumption model, and investigated the difference power analysis.
出处 《科学技术与工程》 2006年第21期3480-3482,共3页 Science Technology and Engineering
关键词 密码分析 旁路攻击 功率泄露 cryptographic analysis side-channel attack power consumption.
  • 相关文献

参考文献4

  • 1[1]Kocher P,Jaffe J,Jun B.Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO'99),Santa Barbara,USA,1999
  • 2[2]Messerges T S,Dabbish E A,Sloan R H,Investigations of power analysis attacks on smartcards.Proceedings of USENIX Workshop on Smartcard Technology,May 1999
  • 3[3]Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model.In:eds Joye M,Quisquater J J.Cryptographic Hardware Embedded System-CHES 2004.USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004
  • 4[4]Messerges T S,Dabbish E A,Sloan R H.Examining smartcard secu rity under the threat of power analysis attacks.IEEE Transactions on Computers,2002

同被引文献12

  • 1李少平,肖庆中.CMOS存储器IDD频谱图形测试[J].电子产品可靠性与环境试验,2004,22(4):50-52. 被引量:3
  • 2周开民,陈开颜,赵强,褚杰,张鹏.DPA方法对加密系统的FPGA旁路攻击研究[J].军械工程学院学报,2006,18(2):51-54. 被引量:6
  • 3陈开颜,赵强,张鹏,邓高明.数据加密标准旁路攻击差分功耗仿真分析[J].计算机测量与控制,2007,15(2):222-223. 被引量:7
  • 4杨延辉,魏少军.集成电路安全与系统科学思想的思考[EB/OL].[2005-07-26].http:∥www.itsec.gov.cn.
  • 5杨庆森,母巍..防DPA攻击的集成电路设计方法[EB/0L]..http:∥www.eetchina.com/ART_8800376323_)480801_d0f74126200509.HTM,,[2005-09-09]..
  • 6北京深思洛克数据保护中心,精锐Ⅳ与传统软件加密锁的技术比较[EB/OL].http:∥sense.com.cn/project/tech_filel.htm.
  • 7Kocher P,Jaffe J,Jun B.Differential power analysis[R] //Proceeding of the Advance in Cryptography(CRYPTO' 99),Santa Barbara,USA,1999.
  • 8Stefan Mangmd,Elisabeth Oswald,Thomas Popp.Power Analysis Attacks-Revealing the Secrets of Smart Cards[M].Springer,2007:97-100.
  • 9William Stallings.Cryptography and Network Security:Principles and Practices[M].Pearson Education.99-102.
  • 10范俊波.AES算法分析及其硬件实现设计[D].成都:西南交通大学,2001:11-13.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部