期刊文献+

数据加密标准旁路攻击差分功耗仿真分析 被引量:7

Side-channel Attacks Simulation for Differential Power Analysis
下载PDF
导出
摘要 器件在加密过程中会产生功率、电磁等信息的泄漏,这些加密执行过程中产生的能量辐射涉及到加密时的密钥信息;文章首先简单分析了CMOS器件工作时产生功耗泄漏的机理,即与门电路内处理数据的汉明距离成正比;详细分析了DES加密过程的功耗轨迹,建立了DES加密过程中的功耗泄漏模型,并利用该模型建立了差分功耗分析(DPA)仿真平台;通过这个仿真平台在没有复杂测试设备与测试手段的情况下,对DES加密实现在面临DPA攻击时的脆弱性进行分析,全部猜测48位子密钥所须时间大约为6分钟,剩下的8位可以通过强力攻击或是附加分析一轮而得到;可见对于没有任何防护措施的DES加密实现是不能防御DPA攻击的。 A cryptographic device implementations leaks information such as power consumption, electromagnetic etc, which can be used by adversary to achieve secret keys. The power leakage principle of CMOS device is introduced, which is in direct portion to Hamming distance processed in gate. The power consumption of DES implementation is analyzed, and power consumption model is constructed, and at last, simulated platform of DPA is built for DES. This simulated platform can be used to analyze the vulnerability of DES implementation for DPA attacks, without complex measurements. It takes about 6 minis to guess all 48bit subkeys,'and the rest 8bit can be achieved by collision attacks. It is obvious that DES imolementation without any countermeasures is vulnerable to DPA attacks.
出处 《计算机测量与控制》 CSCD 2007年第2期222-223,247,共3页 Computer Measurement &Control
基金 国家自然科学基金资助项目(60571037)
关键词 旁路攻击(侧信道攻击) 功耗泄漏模型 差分功耗分析仿真 side-channel attacks power leakage model DPA simulation
  • 相关文献

参考文献3

  • 1Kocher P,Jatte J,Jun B.Differential power analysis[A].Wiener M,editor.Advances in Cryptology:Proceedings of CRYPTO' 99[C].Volume 1666 in Lecture Notes in Computer Science,Santa Barbara,CA,USA,Springer-Verlag 1999,388-397.
  • 2Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[A].Joye M,Quisquater J J,editor.Cryptographic Hardware Embedded System-CHES 2004[C].USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004,16-29.
  • 3Messerges T S,Dabbish E A,Sloan R H.Examining smartcard security under the threat of power analysis attacks[J].IEEE Transactions on Computers,2002,51 (5):541-552.

同被引文献24

  • 1李少平,肖庆中.CMOS存储器IDD频谱图形测试[J].电子产品可靠性与环境试验,2004,22(4):50-52. 被引量:3
  • 2周开民,陈开颜,赵强,褚杰,张鹏.DPA方法对加密系统的FPGA旁路攻击研究[J].军械工程学院学报,2006,18(2):51-54. 被引量:6
  • 3孙海涛,赵强,刘洁.集成电路加密芯片功耗泄漏分析[J].科学技术与工程,2006,6(21):3480-3482. 被引量:4
  • 4邓高明,陈开颜,张鹏,赵强.差分功率分析仿真中的功率消耗模型[J].计算机工程,2007,33(14):239-240. 被引量:4
  • 5Wiliam Stallings.密码编码学与网络安全[M].孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2010.
  • 6Kocher C, Jaffe J, Jn B. Differential power analysis [ C ]// Proceedings of CRYPTO' 99. 1999:388-397.
  • 7Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power Analysis Attacks [ M ]. Springer Science + Business Media, LLC. 2007.
  • 8Paul K. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [ C ]//International Con- ference on Advances in Cryptology. 1996 : 104-113.
  • 9Billy B B, Nicola T. Remote timing attacks are still practical [ J ]. Computer Networks ,2005,48 (5) :701-716.
  • 10Gandolfi K, Mourte C, Olivier F. Electromagnetic analysis: Concrete results [ C ]//2001 International Conference on Cryptographic Hardware and Embedded System (CHES' 01 ). 2001:251-261.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部