期刊文献+

简化固定值掩码二阶差分功耗攻击方法及其防御措施 被引量:4

Second-order Differential Attacking Method of Simple Fixed-value Masking and its Defense Measures
下载PDF
导出
摘要 功耗攻击是近年来嵌入式加密芯片安全的重要威胁之一,它以较低的代价和很快的速度破解未加防护的加密芯片.简化固定值掩码由于所需消耗资源少,特别适合低功耗小面积要求的智能卡,本文对简化固定值掩码的二种实现方法中一种进行了深入研究与分析,通过理论和实验证明简化固定值掩码采用相同字节方法并不能抗二阶功耗攻击.提出一种改进的部分随机固定值掩码算法,理论和实验证明可以抗二阶差分功耗攻击,与上述简化固定值掩码算法相比:本算法在保持简化固定值掩码算法优点的基础上,可以抗二阶差分功耗攻击. Power analysis attacks are one of the biggest threat to embedded encryption chip during the last years,it can break password of the encryption chip protection with lower cost and higher speed.In this paper,the simple fixed-value masking is analyzed in-depth which was proposed by Hwang Chang.The corresponding formal theory of power analysis attacks are designed,which proved that the simple fixed-value masking can not resist second-order difference power analysis by experimental and theoretical evidence.On this basis,an improved fixed-value masking algorithms are designed which can resist second-order differential power attacks.
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第9期1894-1898,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划基金项目(2007AA01Z104)资助 国家自然科学基金项目(60903203)资助 湖南省科技计划项目(2009GK3023)资助
关键词 简化固定值掩码 二阶差分功耗攻击(SO-DPA) AES 防御 simple fixed-value masking second-order differential power analysis attacks AES resistant
  • 相关文献

参考文献1

二级参考文献17

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 3童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 4Mangard S. Securing implementations of block ciphers against side-channel attacks [D]. Graz: Graz University of Technology, 2004.
  • 5Kocher P, Jaffe J, Jun B. Differential power analysis[M]. Lecture Notes in Computer Science. Heidelberg: Springer, 1999, 1666:388-397.
  • 6Messerges T S. Using second-order power analysis to attack DPA resistant software [ M ].Lecture Notes in Computer Science. Heidelberg: Springer, 2000, 1965:238-251.
  • 7Messerges T S, Dabbish E A, Sloan R H. Examining smartcard security under the threat of power analysis attacks [J]. IEEE Transactions on Computers, 2002, 51(5) : 541-552.
  • 8Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model [ M ].Lecture Notes in Computer Science. Heidelberg: Springer, 2004, 3156:16-29.
  • 9Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis [ M ].Lecture Notes in Computer Science. Heidelberg: Springer, 2005, 3659: 293-308.
  • 10Chari S, Jutla C S, Rohatgi P, et al. Towards ,sound approaches to counteract power-analysis attacks [ M ] .Lecture Notes in Computer Science. Heidelberg: Springer, 1999, 1666:398-412.

共引文献7

同被引文献24

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:16
  • 2Guo J,Peyrin T,Poschmann A,et al.The LED block cipher[C]//Proc of the 2011 International Workshop of Cryptographic Hardware and Embedded Systems.Nara,Japan,2011:326-341.
  • 3Mendel Florian,Vincent Rijmen,Deniz Toz,et al.Differential Analysis of the LED Block Cipher[C]//Proc of the 18th International Conference on Theory and Application of Cryptology and Information Security.Beijing,China,2012:190-207.
  • 4Isobe Takanori,Kyoji Shibutani.Security analysis of the lightweight block ciphers XTEA,LED and piccolo[C]//Proc of the 17th Australasian Conference on Information Security and Privacy.Wollongong,Australia,2012:71-86.
  • 5Jovanovic Philipp,Martin Kreuzer,Ilia Polian.A Fault Attack on the LED Block Cipher[C]//Proc of the 3th International Workshop on Constructive Side-Channel Analysis and Secure Design.Darmstadt,Germany,2012:120-134.
  • 6Li Wei,Da-wu Gu,Xiao-ling Xia,et al.Single byte differential fault analysis on the LED lightweight cipher in the wireless sensor network[J].International Journal of Computational Intelligence Systems,2012(5):896-904.
  • 7Rivain M,Prouff E. Provably Secure Higher-Order Masking of AES[C]//In: Mangard S, Standaert F -X(eds.) CHES 2010. LNCS,Springer,Heidelberg,2010:413-427.
  • 8Fumaroli G,Martinelli A,Prouff E,Rirain M. Affine Masking against Higher-Order Side Channel Analysis[C]//In selected Areas in Cryptography, ser. LNCS, vol.6544. Springer, 2010:262-280.
  • 9A M -L,Giraud C. An Implementation of DES and AES, Secure against Some attacks[A]. In: Workshop on Cryptographic Hardware and Embedded Systems CHES 2005, LNCS 2163[C]//Berlin: Springer-Verlag,2005:309-318.
  • 10Mehd I,Laurent Akker,Giraud C. An Implemention of DES and AES, Secure against Some Attacks[A]. Workshop on Cryptographic Hardware and Embedded Systems CHES 2001[C]. Springer-Verlag,2001.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部