摘要
智能卡中加密硬件设计存在很高的操作并发性,单个时钟周期内就会完成多个加密的关键操作(S box查表),造成了差分功耗分析(DPA:Differential Power Analysis)很难有明显的差分效果。为了在差分功耗分析时滤除不相关的S box查表所造成的噪声,结合选择明文的攻击方法对差分功耗攻击进行改进,使攻击过程中多个S box中仅有1个S box输入变化,并对硬件实现的DES(Data Encryption Standard)加密卡进行了攻击。试验结果表明,改进的差分功耗分析方法对硬件DES加密攻击的相关度比普通差分功耗攻击提高150%以上。
Most of the encryption engines in smart cards are designed with high operation concurrency. It takes one clock cycle to execute many encrypt operations, such as S box operations. This deeply decreased the effect of DPA (Differential Power Analysis). To remove this affect, the plain-text chosen attack with the DPA was combined. The improved DPA will only change the inputs of one of the DES ( Data Encryption Standard) S box. Using this improved DPA, the correct key on one of the smart cards with DES encryption has been found. The result shows that the improved DPA on DES encrypfion can increase the correlation value by 150% than the traditional DPA analysis.
出处
《吉林大学学报(信息科学版)》
CAS
2009年第1期62-67,共6页
Journal of Jilin University(Information Science Edition)
基金
国家863高技术研究发展计划基金资助项目(2005AA1Z1080
2007AA012459)
关键词
差分功耗分析
数据加密标准
S盒
选择明文攻击
differential power analysis (DPA)
data encryption standard (DES)
S box
plain-text chosen attack