期刊文献+

不同设计层次下密码运算部件抗功耗攻击能力量化评估技术 被引量:3

Quantitative Evaluation of the Cryptographic Block's Resistibility to Power Analysis Attack at Different Design Level
下载PDF
导出
摘要 为设计有效抗功耗攻击且具有高性价比的安全芯片,需要在其设计实现过程中量化分析密码运算部件抗功耗攻击的防护能力,其关键在于评估防护能力以及模拟密码运算部件的瞬态功耗.以成功实施功耗攻击所需的样本数来量化密码运算部件抗功耗攻击能力,提出了成功实施功耗攻击所需样本数的估算方法;在RTL(register transfer level)级、综合后以及布局布线后等不同设计层次进行瞬态功耗模拟的技术;以及以空间换时间和多线程并行模拟技术,以提高瞬态功耗的模拟速度,也可以用于大规模电路的瞬态功耗模拟. In the design and implementation of cost effective and power-analysis-resistant secure chip, it is necessary to perform quantitative analysis of the cryptographic block's ability to prevent power analysis attack. The key of quantitative analysis is to evaluate the resistibility to power analysis attack and simulate the instantaneous power trace. The number of power samples required to perform power analysis attack successfully is used to characterize the resistibility. The number of samples is computed based on the signal-to-noise ratio of the corresponding power analysis attack. In order to compute the number of power samples, it is necessary to simulate the instantaneous power trace of cryptographic blocks. The instantaneous power trace is expressed as a discrete time sequence of instantaneous current, not the average power consumption or the peak power consumption. A method is presented to simulate the cryptographic block's instantaneous power trace through the design cycle including RTL(register transfer level) design, synthesis and place ~ route. Two kinds of speedup methods which are the time reduction at the cost of space and the multi-thread parallel simulation are proposed. So that the simulation can be speeded up, and also be applicable to power trace simulation of large scale circuits.
出处 《计算机研究与发展》 EI CSCD 北大核心 2009年第6期940-947,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60706026)~~
关键词 功耗攻击 防护能力 量化分析 瞬态功耗模拟 多线程 power analysis attack resistibility to PA quantitative analysis simulation of instantaneous power trace multi-thread
  • 相关文献

参考文献14

  • 1Oswald Elisabeth. On side-channel attacks and the application of algorithmic countermeasures [D]. Graz, Austria: Graz University of Technology, 2003.
  • 2Kocher Paul, Ja E Joshua, Jun Benjamin. Differential power analysis[G] //LNCS 1666: Proe of the 19th Annual Int Cryptology Conf. Berlin: Springer, 1999:388-397.
  • 3Mangard Stefan. Calculation and simulation of the susceptibility of cryptographic devices to power-analysis attacks [D]. Graz, Austria.. Graz University of Technology, 2003.
  • 4Titlieh Stefan. Evaluation of side channel attack resistivity with rapid prototyping [D]. Graz, Austria: Graz University of Technology, 2003.
  • 5Li Huiyun, Theodore Markettos A, Moore Simon. Security evaluation against electromagnetic analysis at design time [C] //LNCS 3659: Proc of the 7th Int Workshop of Cryptographic Hardware and Embedded System. Berlin: Springer, 2005: 280-292.
  • 6Liu Zhenglin, Guo Xu, Chen Yicheng, et al. On the ability of AES S-boxes to secure against correlation power analysis [C] //LNCS 4464: Proc of the 3th Information Security Practice and Experience Conference. Berlin: Springer, 2007: 43-50.
  • 7Messerges Thomas S, Dabbish Ezzat A, Sloan Robert H. Examining smart-card security under the threat of power analysis attacks [J]. IEEE Trans on Computers, 2002, 51 (5) : 541-552.
  • 8Simunic Tajana, Benini Luca, De Micheli Giovanni. Cycle accurate simulation of energy consumption in embedded systems [J]. IEEE Trans on Computer-Aided Design of Circuits and Systems, 2001, 9(1): 15-28.
  • 9李杰,谢巍,刘明业.基于RTL级的数字电路功耗分析[J].北京理工大学学报,2001,21(1):1-5. 被引量:2
  • 10王永文,张民选.高性能微处理器微体系结构级功耗模型及分析[J].计算机学报,2004,27(10):1320-1327. 被引量:5

二级参考文献68

  • 1Wei-WuHu Fu-XinZhang Zu-SongLi.Microarchitecture of the Godson-2 Processor[J].Journal of Computer Science & Technology,2005,20(2):243-249. 被引量:52
  • 2胡定磊,陈书明.低功耗编译技术综述[J].电子学报,2005,33(4):676-682. 被引量:11
  • 3崔昌栋,鞠大鹏,李兆麟.采用路选择技术实现的低功耗高速缓存设计[J].清华大学学报(自然科学版),2007,47(1):116-118. 被引量:1
  • 4朱宁.CMOS数字电路低功耗设计方法研究[M].北京:清华大学微电子学研究所,1999..
  • 5Tullsen D M,Eggers S J,Levy H M,et al.Simultaneous multithreading:maximizing on-chip parallelism[C]//22nd ISCA,1995.
  • 6Tullsan D M.Exploiting choice:instruction fetch and issue on an implementable simultaneous multithreading processor[C]//23nd ISCA,May 1996.Proceedings of the 27th International Symposium on Computer Architecture, ISCA, 2000: 83-94.
  • 7Cai G,Lim C H.Architectural level power/performance optimization and dynamic power estimation[C]//Cool Chips Tutorial collocated with MICRO32,1999.
  • 8Burd T B, Brodersen R W.Energy efficient CMOS microprocessor design[C]//Proceedings of HICSS Conference, Maui, Hawaii, 1995 : 288-297.
  • 9Dhodapkar A,Lim C H,Cai G.TEMPEST:a Thermal Enabled MultiModel Power/Performance Estimator[C]//Workshop on Power-Aware Computer Systems,Boston,2000:112-125.
  • 10Ghiasi S,Grunwald D.A comparison of two architectural power models[C]//Workshop on Power-Aware Computer Systems,Cambridge, 2000:137-151.

共引文献18

同被引文献19

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部