期刊文献+

等功耗编码算法的改进实现及抗功耗分析攻击研究 被引量:5

Improvement of equivalent power consumption coding secure against power analysis attacks
下载PDF
导出
摘要 等功耗编码算法是一种既能提高算法效率,又能提高抗功耗分析攻击安全性的算法,但由于伪操作设计缺陷,原型算法在全零段时存在抗攻击弱点。经过对伪操作重新设计的优化改进,算法的安全性得到进一步加强。同时还给出了一种使用蒙哥马利算法的快速算法实现,在进一步提高算法效率的同时,并未削弱其安全性。在功耗测试平台上的实测结果也验证了该改进算法抗功耗分析攻击的有效性。 Equivalent power consumption coding algorithm not only could improve algorithm efficiency,but also could be against the power analysis attacks.But it had weaknesses in all-zero exponential segment because of a defect of pseudo-operation design.So a new pseudo-operation was proposed to improve the algorithm’s security.And a rapid im-plementation using Montgomery algorithm was presented too.It could accelerate the operation with no-lower safety.The research’s validity is proved in the real power testing platform.
出处 《通信学报》 EI CSCD 北大核心 2010年第8期26-30,共5页 Journal on Communications
基金 国家自然科学基金资助项目(60873216) 电子信息产业发展基金资助项目([2006]824 [2006]717) 四川省应用基础研究基金资助项目(2008JY0078) 四川省教育厅科研基金资助项目(2006C033) 成都市"十一五"重大科技专项([2009]33) 成都信息工程学院校选科研基金资助项目(CRF200708)~~
关键词 信息安全 边信道攻击 功耗分析攻击 等功耗编码算法 information security side channel attacks power analysis attacks equivalent power consumption coding
  • 相关文献

参考文献12

  • 1KOCHER P.Timing attacks on implementations of diffie-hellman,RSA,DES,and other systems[A].Proceedings of Advances in Cryptology-CRYPTO'96[C].1996.104-113.
  • 2DHEM J F,KOEUME F,LEROUX P A,et al.A practical implementation of the timing attack[A].Proceedings of CARDIS 1998[C].1998.14-16.
  • 3MESSERGES T S,DABBISH E A,SLOAN R H.Investigations of power analysis attacks on smartcards[A].Proc USENIX Workshop Smartcard Technology[C].Chicago,Illinois,USA,1999.151-161.
  • 4KOCHER P,JAFFE J,JUN B.Differential power analysis[A].Proceedings of Advances in Cryptology-CRYPTO'99[C].1999.388-397.
  • 5ITOH K,IZU T,TAKENAKA M.Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA[A].CHES 2002[C].2003.129-143.
  • 6ITOH K,IZU T,TAKENAKA M.A practical countermeasure against address-bit differential power analysis C D[A].CHES 2003[C].2003.382-396.
  • 7CORSONELLO P.An integrated countermeasure against differential power analysis for secure smart-cards[A].ISCAS[C].2006.5611-5614.
  • 8RATANPAL G B,WILLIAMS R D,BLALOCK T N.An on-chip signal suppression countermeasure to power analysis attacks[J].IEEE Transactions on Dependable and Secure Computing,2004,1(3):179-189.
  • 9MESSERGES T S.Securing the AES finalists against power analysis attacks[A].Proceedings of Fast Software Encryption Workshop 2000[C].2000.150-164.
  • 10GEBOTYS C H.A table masking countermeasure for low-energy secure embedded systems[J].IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2006,14(7):740-753.

二级参考文献22

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2赵彦光,白国强,陈弘毅,刘鸣.ECC专用密码芯片的功耗分析研究[J].计算机工程与应用,2006,42(16):25-28. 被引量:3
  • 3童元满,戴葵,陆洪毅,王志英.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16. 被引量:5
  • 4童元满,王志英,戴葵,陆洪毅.一种基于随机混合坐标表示的防功耗分析标量乘法实现方法[J].小型微型计算机系统,2007,28(1):159-165. 被引量:3
  • 5KOCHER E Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Proceedings of Advances in Cryptology-CRYPTO'96[C]. 1996. 104-113.
  • 6DHEM J F, KOEUME F, LEROUX P A, et al. A practical implementation of the timing attack[A]. Proceedings of CARDIS 1998[C]. 1998.14-16.
  • 7MESSERGES T S, DABBISH E A, SLOAN R H. Investigations of power analysis attacks on smart cards[A]. Proc USENIX Workshop Smartcard Technology[C]. Chicago, Illinois ,USA, 1999. 151-161.
  • 8KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Proceedings of Advances in Cryptology[C]. 1999.388-397.
  • 9ITOH K, IZU T, TAKENAKA M. Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA[A]. CHES 2002[C]. 2003. 129-143.
  • 10ITOH K, IZU T, TAKENAKA M. A Practical Countermeasure against address-bit differential power analysis C D[A]. CHES 2003[C]. 2003.382-396.

共引文献20

同被引文献26

  • 1饶金涛,陈运,吴震,陈俊,许森.一种抗简单功耗分析攻击的模幂算法[J].成都信息工程学院学报,2011,26(2):123-126. 被引量:2
  • 2韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 3Kocher P C.Timing Attacks on Implementations of Diffie- Hellman, RSA, DSS, and Other Systems[C]//Proc.of CRYPTO’96.Santa Barbara, USA: Springer-Verlag, 1996.
  • 4Kocher P C, Jaffe J, Benjamin J.Differential Power Analysis[C]//Proc.of CRYPTO’99.Santa Barbara, USA: Springer-Verlag, 1999.
  • 5Perin G, Torres L, Benoit P.Amplitude Demodulation-based EM Analysis of Different RSA Implementations[C]//Proc.of Design, Automation and Test in Europe Conference and Exhibition.[S.l.]: IEEE Press, 2012.
  • 6Denis T S.BigNum Math: 加密多精度算法的理论与实 现[M].尹浩琼, 译.北京: 中国水利水电出版社, 2008.
  • 7Kouichi Itoh,Tetsuya Izu,Masahiko Takenaka.A Practical Countermeasure against Address-Bit DifferentialPower Analysis. CHES 2003 . 2003
  • 8Kocher P. Timing Attacks on Implementations of Diffie-Hellman,TSA,DES,and Other Systems[A].Springer-verlag,1996.104-113.
  • 9Toru A,Takagi T. Power Analysis to ECC Using Differential Power Between Multiplication and Squaring[A].Tarragona,Spain,2006.151-164.
  • 10孙世新.有限域和椭圆曲线数乘运算研究[D]成都:电子科技大学,2006.

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部