分析泄漏功率攻击采用90nm CMOS技术的加密器件
摘要
在电子商务与电子银行等应用中,安全要求越来越严格。虽然加密技术提供了强健的算法,但这些算法的物理实现一般会通过器件电气运行中的物理现象,泄漏一些信息,攻击者会利用它来探测密钥。这些“旁路”(side-channel)攻击利用加密实现硬件模块所泄漏的信息。该信息可能包含数据与功耗或时序之间的相互关系(参考文献1)。一种广为报道的强大旁路攻击方法是微分功率分析(differential—power analysis),因为它能让攻击者用现售元件做出的测量设置探测出密钥(参考文献2)。攻击者依据的事实是,标准CMOS逻辑的动态功耗主要依赖于输入数据。例如,考虑一个简化的CMOS反相器模型,它以一只接地电容作为自己的负载。
参考文献10
-
1Kocher,P,J Jaffe,B Jun."Differential Power Analysis:Advances in Cryptology,"[].Lecture Notes in Computer Science.1999
-
2Shamir,A."Protecting smart cards from passive power analysis with detached power supplies,"[].Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems.2000
-
3Ferr,Antoni,,Joan Figueras."On estimating leakage power consumption for submicron CMOS digital circuits,"[].IEEE International Workshop on Power and Timing ModelingOptimization and Simulation.1997
-
4Abdollahi,Afshin,Farzan Fallah,Massoud Pedram."Leakage current reduction in CMOS VLSI circuits by input vector control,"[].IEEE Transactions on VLSI Systems.2004
-
5Chen,Zhanping,Liqiong Wei,Mark Johnson,Kaushik Roy."Estimation of standby leakage power in CMOS circuits considering accurate modeling of transistor stacks,"[].International Symposium on Low Power Electronics and Design.1998
-
6Rankl,Wolfgang,W Effing.Smart Card Handbook[]..2003
-
7Jovanovic,Milena,Z Mijanovic."Leakage Analysis Attacks for CMOS Cryptographic Hardware and TDPL Technology as Countermeasure,"[].Yuinfo Conference.2007
-
8Jovanovic,Milena."DPA Attack on FPGA Implemented Cryptographic Core,"[].VIPSI Conference.2008
-
9Hess E,Janssen N,Meyer B, et al.Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures - a survey[].EUROSMART Security Conference Proceedings.2000
-
10S. Narendra,S. Borkar,V. De,D. Antoniadis,and A. Chandrakasan.Scaling of stack effect and its application for leakage reduction[].ISLPED.2001
-
1崔晓楠.采用加密器件防止网游账号被盗[J].今日电子,2009(1):58-59.
-
2杨敬文,李莉,邱昊.对称无线网络下干扰对齐算法的研究[J].上海师范大学学报(自然科学版),2015,44(1):32-38. 被引量:2
-
3吴训威.三值CMOS反相器的研究[J].科技通报,1989,5(2):1-3. 被引量:1
-
4李新玉,杨三清.破解GAL加密逻辑的一种方法[J].江汉石油学院学报,2000,22(2):85-86.
-
5Naiji LU,Yu HAN,Tian CHEN,Douglas David GUNZLER,Yinglin XIA,Julia LIN,Xin Ming TU.精神医学中的生物统计学(16) 把握度分析在横断面研究和纵向研究设计中的应用(英文)[J].上海精神医学,2013,25(4):259-262. 被引量:1
-
6王文琦.电气自动控制中的PLC技术研究[J].科技致富向导,2014,0(30):124-124. 被引量:1
-
7刘帅锋.PLC技术在工业电气自动化中的应用[J].大科技,2012(12):47-47. 被引量:1
-
8谭华.电气自动化控制系统分析[J].电子世界,2014(20):31-31.
-
9牟爱霞,张振明.桥式起重机电气运行故障分析[J].自动化应用,2013(4):31-32. 被引量:3
-
10钟祖福.日置3390功率分析计[J].电世界,2009,50(3):51-51.