期刊文献+

差分功率分析攻击中的信号对齐方法研究 被引量:4

Research about Misalignment of Signal in DPA
下载PDF
导出
摘要 针对差分功耗分析(DPA)攻击的原理及特点,分析了未对齐信号对DPA攻击的影响.论述了现在已知的对未对齐信号的频域和模式识别处理方法,分别分析了它们的原理及优缺点,提出了在时域内对未对齐信号采用分段处理进行对齐的方法.通过实验验证了该方法的正确性及有效性,该方法能够有效的处理未对称信号,提高DPA攻击的效率,减少DPA攻击的样本量. This paper firstly declares the principle of the differential power analysis attack (DPA) technology, and shows the affects when power analysis in attacking the misaligrnment signs. Then, it analyzes the two methods for the question about misalignment signs. Thirdly, it gets the method about subsection for signs to align the signs. Finally, with experiment, it proves this method can lead to the success of differential power analysis, and it can reduce the amounts of samples.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第7期227-229,233,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60571037) 国家"八六三"计划项目(2007AA01Z454)
关键词 DPA攻击 未对齐信号 分段处理 DPA misaligrtment subsection
  • 相关文献

参考文献6

  • 1Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis[J]. Lecture Notes in Computer Science, 1999(1666) : 388 - 397.
  • 2Eric Brier, Christophe Clavier, Francis Olivier, Correlation power analysis with a leakage model[C]//Cryptographic Hardware and Embedded Systems CHES 2004. Berlin: Springer, LNCS 2004(3156) : 16 - 29.
  • 3Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 11 - 19]. http://www. impan.gov.pl/BC/Program/conferences/07Crypt - abs/Aumonier% 20 - % 20SubmissionWorkshopSA.pdf.
  • 4Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks-revealing the secrets of smart cards[ M]. USA: Springer Science Business Media, 2007: 61 - 65.
  • 5Joan Daemen, Vincent Rijmen. The design of rijndael: AES - the advanced encryption standard [ M]. Berlin: Springer-Verlag, 2002.
  • 6Gebotys C, Ho S, Tiu A. EM analysis on rijindael and ECC on a PDA[C]//Proc. of CHES. UK, 2005.

同被引文献38

  • 1赵彦光,白国强,陈弘毅.一种针对特征2域椭圆曲线密码芯片的差分功耗分析[J].微电子学与计算机,2006,23(12):78-81. 被引量:5
  • 2童元满,王志英,戴葵,陆洪毅.可扩展公钥密码协处理器的设计与实现[J].小型微型计算机系统,2007,28(2):243-246. 被引量:1
  • 3Cilardo A, Coppolino L, Mazzocca N, et al. Elliptic curve cryptography engineering[J]. Proceedings of the IEEE,2006,94(2):395-405.
  • 4Kocher P, Joshua Jaffe, Benjamin Jun. Introduction to differential power analysis and related attacks [ EB/ OL]. [2009 - 09 - 19]. http..//www, cryptography. com/dpa/technical.
  • 5Itoh K , IZu T, Takenaka M. Address bit differential Power analysis of eryptographic schemes OK-ECDH and OK-ECDSA[C]. CHES' 2002, LNCS2523,2003 : 129-143.
  • 6Paul Ckocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [C]//19th Annual International Cryptology Conference. California: Advances in Cryptology, 1999.
  • 7Dakshi Agrawal, Bruce Archambeault, Josyula R, et al. Cryptographic hardware and embedded systems [C]//The EM Side-channel(s). California: Springer, 2003.
  • 8Paul C kocher. Timing attacks on Implementations of diffie-hellman, RSA, DSS, and other systems [C]// 16th Annual International Cryptology Conference. California: Advances in Cryptology,1996.
  • 9Korobogatov S. Semi-invasive attacks-a new approach to hardware security analysis[D]. London.. University of Cambridge, Computer Laboratory, 2005.
  • 10Skorobogatov S, Anderson R. Cryptographic hardware and embedded systems workshop 2002[C]// Optical fault Induction attacks. California, 2002.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部