期刊文献+

差分功率分析攻击中的信号处理与分析 被引量:8

Signal Processing and Analysis Techniques in Differential Power Analysis
下载PDF
导出
摘要 信号处理与分析是差分功率分析攻击中的关键技术.详细给出信号轨迹对齐、信号去噪、信号压缩、时-频信号转换以及差分轨迹尖峰判别等功率信号处理与分析技术.针对AES单片机实现的攻击实验表明,采用上述信号处理与分析技术的差分功率分析,利用3000个功率轨迹样本,可以成功获取AES密码算法的密钥. Signal processing and analysis are key techniques used in differential power analysis. This paper presents some techniques of processing and analyzing power signal in detail. Including alignment of power traces, denoising, compression of power traces, time-frequency transform and identification of a significant differential signal peak. The result of the differential power analysis attack against the AT89C52 microcontroller that executes a software implementation of AES shows that the AES key can be recovered with 3 000 samples under the using of the above techniques.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第11期1-4,8,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60571037) 国家"八六三"计划项目(2007AA01Z454)
关键词 差分功率分析 信号处理 信号分析 AES differential power analysis(DPA) signal processing signal analysis AES
  • 相关文献

参考文献6

  • 1Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [ J ]. Lecture Notes in Computer Science, 1999(1666) :388-397.
  • 2Eric Brier, Christophe Clavier, Francis Olivier. Corrdation power analysis with a leakage model [C]//Cryptographic Hardware and Embedded Systems - CHES 2004. Berlin: Springer, LNCS 3156, 2004:16-29.
  • 3Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 10 11]. http://www, impan, gov. pl/BC/Program/conferences/07Crypt - ahs/Aumonier% 20 - % 20SubmissionWorkshopSA. pdf.
  • 4Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks - revealing the secrets of smart cards [M]. USA:Springer, 2007:61-65.
  • 5Joan Daemen, Vincent Rijmen. The design of rijndael: AES- the advanced encryption standard [ M ]. Berlin: Springer- Verlag, 2002.
  • 6石伟,戴葵,童元满,龚锐.防DPA攻击的标准单元库的设计与实现[J].微电子学与计算机,2007,24(2):51-54. 被引量:4

二级参考文献6

  • 1E Hess,N Janssen,B Meyer,et al.Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures-a survey[C].In:Proceedings of EUROSMART Security Conference,Marseille,France,2000,55~64
  • 2P Kocher,J Jaffe,B Jun.Differential power analysis[C].In:Proceedings of Advances in Cryptology,Santa Barbara,CA,USA,1999,388~397
  • 3L Goubin,J Patarin.DES and differential power analysisthe duplication method[C].In:Cryptographic Hardware and Embedded Systems,Worcester,MA,USA,1999,158~172
  • 4K Tiri,I Verbauwhede.A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[C].In:Proceedings of Design Automation and Test in Europe Conference,Paris,France,2004,246~251
  • 5K Tiri,M Akmal,I Verbauwhede.A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards[C].In:Proceedings of 28th European Solid-State Circuits Conference,Florence,Italy,September 2002,403~406
  • 6H Schneider.Analysis of the resistance of different logic styles against SPA & DPA attacks[D].Graz,Austria:Graz University of Technology,2003

共引文献3

同被引文献75

  • 1郑秀林,李敏.SMS4算法的一种改进[J].北京电子科技学院学报,2007,15(4):16-18. 被引量:4
  • 2胡祥义,刘彤.动态对称密码算法的研究与探讨[J].网络安全技术与应用,2006(3):69-71. 被引量:7
  • 3黄凯明.滑动平均数字滤波参数研究[J].集美大学学报(自然科学版),2006,11(4):381-384. 被引量:23
  • 4陈开颜,赵强,张鹏,邓高明.数据加密标准旁路攻击差分功耗仿真分析[J].计算机测量与控制,2007,15(2):222-223. 被引量:7
  • 5梅长林.实用统计方法[M].北京:科学出版社,2006:117-120.
  • 6Paul Kocher. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]// Neal Koblitz. Advances in Cryptology, Proceedings Crypto 96, LCNS. New York: ACM, 1996:104-113.
  • 7Chari S, Rao J R, Rohatgi P. Template attacks[C]// Proceeding of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'03) . Cologne, Germa- ny: Computer Science, 2003:13-28.
  • 8Dennis Vermoen. Reverse engineering of Java Card appiers using power analysis [D]. Netherlands:TU Delft, 2007.
  • 9Sung-MoKang,YusufLeblebici.CMOS数字集成电路一分析与设计[M].王志功,窦建华,译.北京:电子工业出版社,2005:97-98.
  • 10KOCHER P, JAFFE J, JUN B. Differential power analysis [C]// Advances in Cryptology - CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999:388 -397.

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部