期刊文献+

DES差分功耗分析研究及仿真实现 被引量:5

Research and realization of simulation of DES differential power analysis attacks
下载PDF
导出
摘要 在分析CMOS芯片工作时功率消耗原理的基础上,提出一种简洁高效的功耗模型,设计一种针对DES加密算法的差分功耗攻击方案,并在自主开发的功耗分析仿真器上完成破解DES加密算法中的48位子密钥,结果表明未加防护的DES加密系统存在安全隐患,该仿真器亦为功耗攻击方法及抗功耗攻击的研究提供一种简洁、直观、快速、有效的评估平台,最后对抗功耗攻击方法进行分析。 Based on the principle of power leakage of CMOS chips,a simple and efficient power consumption model is presented,and a power analysis attack scheme for DES encryption algorithm is devised,and then the 48-subkey of DES encryption algorithm is cracked on this self-developed power analysis simulator.The result shows that DES encrypted systems without any extra protective measures have potential security problems.The simulator provides a simple, intuitionistic, fast and effective evaluation platform for the research of power analysis methods and anti-power analysis.Finally,the possible anti-power methods are analyzed.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第33期82-84,111,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60706026 国家高技术研究发展计划(863)No.2007AA01Z104~~
关键词 差分功耗分析 功耗分析仿真器 功耗模型 数据加密标准(DES) differential power analysis power analysis simulator power consumption model Data Encryption Standard(DES)
  • 相关文献

参考文献9

  • 1Anderson R J,Kuhn M G.Low cost attacks on tamper resistant devices[C] //Proceedings of the 5th International Workshop on Security Protocols,Paris,1997:125-136.
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[C] //Proccedings of Advances in Cryptoiogy-CRYPTO'99,Santa Barbara,CA,USA,1999:388-397.
  • 3Rabsey J M.Digital integrated circuits[M].Englewood Cliffs,NJ:Prentice-Hall,1996.
  • 4Messerges T S,Dabbish E A,Sloan R H.Examining smart card security under the throat of power analysis attacks[J].IEEE Trans on Computers,2002,51(5):541-552.
  • 5Guilley S,Hoogvorst P,Pacalet R.Differential power analysis model and some results[C] //CARDIS 2004.2004:127-142.
  • 6URMl,IAIK,KURLD.Final report modeling & simulation of SCA effects,IST-2002-507270[R].Europe:IAIK,2005.
  • 7褚杰,丁国良,邓高明,赵强.DES差分功耗分析攻击设计与实现[J].小型微型计算机系统,2007,28(11):2070-2073. 被引量:12
  • 8Data Encryption Standard.Federal Information Processing Standard(FIPS)[S].US Department of Commerce,Washington DC,1977.
  • 9Brier E,Clavier C,Oiivler F.Corrclation power analysis with a leakage model[C] //LNCS 3156:CHES 2004,2004:16-29.

二级参考文献1

共引文献11

同被引文献40

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:15
  • 2陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 3C'eline ThuiUet, Philippe Andouard,Olivier Ly. A smart card power analysis simulator [C]. In: International Conference on Com- puter Science and Engineering, 2009, 847-852.
  • 4Xuefei Bai, Yao Wang, Yifei Wang, et.al.A Power Analysis Attack Software Simulation Platform Design and Its Applications. In: International Conference on Computer Engineering and Technology, 2010, 479-482.
  • 5Hayashi Y. Evaluation of information leakage from cryp- tographic hardware via common-mode current[C]. IEICE TRANSACTIONS on Electronics. Japanese: Japan Aca- demic Association, 2012, E95-C(6) : 1089-1097.
  • 6Kuhn M G. Compromising emanations: eavesdropping risks of computer displays [ R]. England: University of Cambridge Computer Laboratory Technical Report, 2003, UCAM-CL-TR: 577-581.
  • 7Van Eck W. Electromagnetic radiation from video display units: An eavesdropping risk[J]. Computers and Securi- ty, 1985, 4(4): 269-286.
  • 8Kasper T, Oswald D, Paar C. EM Side-channel attacks on commercial eontactless smartcards using low-cost equipment[ R] . Germany: Horst G6rtz Institute for IT Security Ruhr University Bochum, 2009, LNCS 5932: 79-93.
  • 9Gandol K, Mourtel C, Olivier F. Electromagnetic analys- is: concrete results, hardware and embedded systems[J ]. Computer Science, 2001, 2162: 251-262.
  • 10Sekiguchi H, Seto S. Measurement of radiated computer RGB signals[ C]. America: Progress In Electromagnet- ics Research, 2009, 7- 1-12.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部