期刊文献+

时间和功耗双随机化的AES抗差分能量攻击设计 被引量:1

Design of AES on Time Randomization and Power Randomization Based Differential Power Analysis Resist Countermeasure
下载PDF
导出
摘要 分析了时间随机化技术的不足以及掩码技术(功耗随机化)的缺点,在完全防御差分能量攻击的基础上进行基于抗差分能量攻击的设计,提出一种时间和功耗双随机化的电路结构,将其应用在AES算法中,并在FPGA密码芯片、示波器和PC机组成的功耗采集分析平台中进行了验证.结果表明,该电路具备较强的抗差分能量攻击能力. The problem which time randomization can' t defend differential power analysis completely and the defect of the MASK technique which is usually implemented for the power randomization is analyzed. Based on the absolutely resist differential power analysis, the design should focus on the resource and commonness, the paper propose a time and power randomization circuit, AES algorithm containing this circuit is implemented and is testified in the power collection and analysis system. The result of differential power analysis prove the design to be practical to resist DPA.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期659-663,共5页 Journal of Beijing University of Technology
基金 国家'八六三'计划基金项目资助(2008AA01Z0103)
关键词 差分能量攻击 时间随机化 功耗随机化 AES算法 differential power analysis time randomization power randomization AES cryptography
  • 相关文献

参考文献8

  • 1KOCHER P, JAFFE J, JUN B. Differential power analysis[ C ]//Proc. Advances in Cryptology (CRYPTO '99), Germany: Berlin Springer, 1999 : 388-397.
  • 2MESSERGES T S, DABBISH E A, SLOAN R H. Investigations of power analysis attacks on smartcards[ C]//Usenix Workshop on Smartcard Technology, Chicago: Illinois, 1999: 151-162.
  • 3AKIHIKO S, KOKI A. Algorithm-level evaluation of DPA resistance to cry. ptosystems[ J]. Electrical Engineering in Japan, 2008, 165(3): 1221-1228.
  • 4CLAVIER C, CORON J S, DABBOUS N. Differential Power Analysis in the Presence of Hardware Countermeasures[ C ] //CHES 2000, Berlin: New York Springer, 2000: 252-263.
  • 5韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 6GOLIC J D, TYMEN C. Muhiplicative masking and power analysis of AES[ C] //Workshop on Cryptographic Hardware and Embedded Systems - CHES 2002, Berlin: New York Springer, 2002 : 198-212.
  • 7MESSERGES T. Using Second-Order Power Analysis to Attack DPA Resistant Software [ C ]// Workshop on Cryptographic Hardware and Embedded Systems - CHES 2000, Berlin: Berlin Springer, 2000- 238-251.
  • 8GOUBIN L, PATARIN J. DES and differential power analysis-the duplication method [ C]// Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, Berlin: Berlin Springer, 1999: 158-172.

二级参考文献5

  • 1Kocher P,Jaffe J,Jun B.Differential Power Analysis[C].Proceedings of CRYPTO'99,Santa Barbara,USA,1999:388-397.
  • 2Tiri K,Akmal M,Verbauwhede I.A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smartcards[C].Proceedings of the 28^th European Solid-state Circuits Conference,Florence,Italy,2002,403-406
  • 3Itoh K,Yajima J,Takenaka M,et al.DPA Countermeasures by Improving the Window Method[C].Proceedings of Cryptographic Hardware and Embedded Systems,San Francisco Bay,USA,2002:303-317.
  • 4Fran J,Dhem C,Feyt N.Hardware and Software Symbiosis Helps Smart Card Evolution[J].IEEE Micro,2001,21(6):14-15.
  • 5Messerges T S.Power Analysis Attacks and Countermeasures for Cryptographic Algorithms[D].Graduate College of the University of Illinois at Chicago,2000:106-153.

共引文献7

同被引文献6

  • 1Miller V. Use of elliptic curvès in cryptography[A].Springer-verlag,1986.417-426.
  • 2Koblitz N. Elliptic curve cryptosystems[J].Mathematics of Computation,1987.203-209.doi:10.1090/S0025-5718-1987-0866109-5.
  • 3Coron J S. Resistance against differential power analysis for Elliptic curve cryptosystems[A].Beilin:Springer-Verlag,1999.
  • 4Kim C K,Ha J C,Moon S J. An improved and efficient countermeasure against Power Analysis Attacks[EB/OL].http://eprint.iacr.org//2005/022.pdf,2005.
  • 5Hadi M,Erfan K M,Behazd K. An efficient algorithm resistant to SPA and DPA variants in ECC[A].2008.
  • 6殷新春,侯红祥.改进的滑动窗口标量乘算法[J].小型微型计算机系统,2008,29(5):863-866. 被引量:4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部