期刊文献+

DES加密算法的差分电磁攻击实现 被引量:4

Realization of DEMA for DES Implementation
下载PDF
导出
摘要 差分电磁攻击是一种针对密码算法的侧信道攻击方法.根据CMOS器件工作时产生发射辐射的原理,建立了针对DES加密算法的电磁侧信道攻击平台;对差分攻击方法和电磁辐射分析进行了说明;结合虚拟仪器技术,采用磁场探头对单片机的电磁辐射进行测量,获得了较好的信号;利用针对多CPU的优化算法,实现了在1000组样本量下快速破解DES加密算法,整个实验过程在半小时内完成. DEMA is a side channel attacks which used to access the key of DES efficiently. According to the electromagnetic leakage principle of CMOS chips, a platform of DEMA for DES has been constructed; differential attacks and the principle of radiated electromagnetic analysis was introduced. Based on virtual instrument technology, the radiated electromagnetic was measured by magnetic probe and supplied good signal. A electrornagnetic attack with 1000 samples has been realized with optimization algorithm for multi-core computer. All progress only took half an hour.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第12期34-37,共4页 Microelectronics & Computer
基金 国家"八六三"计划项目(2007AA01Z454)
关键词 侧信道分析 差分电磁分析 DES 电磁环境 side-channel cryptanalysis DEMA DES electromagnetic environment
  • 相关文献

参考文献7

  • 1Kocher P, Jaffe J, Jun B. Differential power analysis, advances in cryptology[C]//Proceedings of CRYPTO' 99, number 1666 in Lecture Notes in Computer Science. Santa Barbara, CA, USA: Springer-Verlag,1999:388-397.
  • 2Quisquater J J, Samyde D. A new tool for nonintrusive analysis of smart cards based on electromagnetic emissions: the SEMA and DEMA methods[ C] // Eurocrypt rump session. [ S. L], 2000.
  • 3Quisquater J J, Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards [J ]. Smart cards programming and security (e- Smart 2001 ), Springer, 2001(2140) : 200 - 210.
  • 4Karine Gandolfi, Christophe Mourtel, Francis Olivier. Electromagnetic analysis: concrete results [ J ]. Cryptographic Hardware and Embedded Systems, Springer-Verlag, 2001, LNCS(2162) : 251 - 261.
  • 5Lazic D E, Th Beth, Geiselmann W, et al. One- trial electromagnetic attack on modular exponentiation[J ]. ITG Fachbericht, 2004(181) : 111 - 118.
  • 6De Mulder E, Buysschaert P, Ors S B, et al. Electroromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem [ C ]// World Automation Congress- WAC'06. Scotland, 2006: 1 - 6.
  • 7邓高明,张鹏,陈开颜,赵强.Cache在旁路攻击中的理论应用及其仿真实现[J].微电子学与计算机,2007,24(5):76-79. 被引量:5

二级参考文献3

  • 1谢满德.嵌入式CPU设计中Cache性能的全局优化[J].微电子学与计算机,2005,22(2):143-147. 被引量:3
  • 2Daniel Page.Theoretical use of cache memory as a cryptanalytic side-channel[EB/OL].URL:http://eprint.iacr.org/2002/169/
  • 3Hill M D.Aspects of cache memory and instruction buffer performance[R].Technical Report CSD-87-381,University of California,Berkeley,November 1987

共引文献4

同被引文献33

  • 1汪朝晖,陈建华,涂航,李莉.素域上椭圆曲线密码的高效实现[J].武汉大学学报(理学版),2004,50(3):335-338. 被引量:13
  • 2刘鹤,陈运,吴震,陈俊,朱冰.真实硬件环境下针对椭圆曲线密码体制的简单功耗分析攻击[J].成都信息工程学院学报,2011,26(1):1-4. 被引量:1
  • 3谢处方,饶克谨.电磁场与电磁波[M].北京:高等教育出版社,2008.
  • 4Kris Tiri, Ingrid Verbauwhede. A digital design flow for secure integrated cireuits[J]. IEEE Ttransactions on Computer- Aided Design of Integrated Circuits and Systems, 2006,25(7) : 1197--1208.
  • 5Tiri K,Akmal M ,Verbauwhede I. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards[C]//Process of the 28th European Solid- State Circuits Conference. Florence, Italy: IEEE, 2002: 403-406.
  • 6Agrawal D, Archambeauh B, Rao J, et al. The EM side -- channel(s) [C]//Proceedings of Cryptographic Hardware and Embedded Systems- CHES2002, London, UK: Springer- Verlag, 2003 : 29-- 45.
  • 7Huiyun Li, A. Theodore markettos and simon moore, "Security evaluation against electromagnetic analysis at design time" [C]// proceedings of Workshop on Cryptographic Hardware and Embedded Systems ( CHES2005 ). Edinburgh, Scotland.. Springer, 2005:280-292.
  • 8N Koblitz.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48:203-209.
  • 9Victor S.Use of Elliptic Curves in Cryptography[C].Proceedings of Crypto 85,LNCS 218,Spring,1986:417-426.
  • 10Paul C Kocher.Timing attacks on implementation of Diffie-Hellman,RSA,DSS,and Other Systems[C].Advances in Cryptology:Proceeding of CRYPTO' 96,SpringerVerlag,1996:104-113.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部