期刊文献+

旁路信息的分级泄露模型与安全性分析

Side-channel leakage model and security analysis
下载PDF
导出
摘要 旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。从信息泄露的一般性出发,提出了一种旁路信息分级泄露模型并给出其形式化描述。该模型将泄露信息分为算法级、指令级和逻辑门级泄漏。在此基础上,对不同泄露级别上采用的防御方法的安全性进行分析比较,最后对抗旁路攻击的安全芯片的设计给出建议。 Side-channel attack is a new cryptanalysis,and it utilizes the run-time leakages to extract the secret.From the point of information leakage,this paper poposed a three-level leakage model through a formal description.The proposed model included the algorithm-level leakage,instruction-level leakage and gate-level leakage.Based on this model,discussed diffe-rent countermeasures on each leakage level.And then gave a suggestion to build a secure cryptographic chip.
作者 张涛 范明钰
出处 《计算机应用研究》 CSCD 北大核心 2008年第6期1799-1801,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60373109 60272091)
关键词 密码芯片 旁路攻击 分级泄漏模型 cryptographic chips side-channel attack three-level leakage model
  • 相关文献

参考文献15

  • 1KOCHER P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[ C ] //Proc of CRYPTO' 96. [ S.l. ] : Springer-Verlag, 1996:104-113
  • 2KOCHER P, JAFFE J, JUN B. Differential power analysis[ C ] // Proc of CRYPTO'99. [S.l. ] : Springer-Verlag, 1999:388-397.
  • 3AGRAWAL D. The EM side channels [ C ] //Proc of CHES 2002. [ S.l. ] : Springer-Verlag, 2003:29-45.
  • 4MICALI S, REYZIN L. Physically observable cryptography [ C ] // Proc of TCC. 2004:278-296.
  • 5STANDAERT F X, MALKIN T G, YUNG M. A formal practiceoriented model for the analysis of side-channel attacks, version 1.4 [ EB/OL]. [ 2006-12-04 ]. http : //eprint. iacr. org/2006/139.pdf.
  • 6NAUR, PETER. Revised report on the algorithmic language ALGOL 60[J]. Communications of tho ACM, 1960,3(5) :299-314.
  • 7OSWALD E. Enhancing simple power-analysis on elliptic curve cryptosystems[ C] //Proc of CHES 2002. [ S.l. ] : Springer-Verlag, 2003 : 82- 97.
  • 8OKEYA K, TAKAGI T. A more flexible countermeasure against side channel attack using window method [C ] //Proc of CHES 2003. [ S.l. ] : Springer-Verlag, 2003:397-410.
  • 9JOYE M, QUISQUATER J J. Hessian elliptic curves and side-channel attacks[ C] //Proc of CHES 2001. [ S.l ]: Springer-Verlag, 2001 : 402-410.
  • 10STANDAERT F X, PEETERS E. On the masking countermeasure and high order power analysis attacks [ C ] //Proc of International Conference on Information Technology. 2005:562-567.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部