期刊文献+

旁路模板在密码芯片指令分析中的应用 被引量:4

Side Channel Template in Retrieve Cipher Chips′ Instructions
下载PDF
导出
摘要 集成电路微控制器芯片在执行不同的指令时会产生不同的功耗旁路泄露特征,根据这些特征用统计方法构建对应不同指令以及指令执行路径的旁路模板,并根据极大似然方法匹配目标芯片工作时泄露的功耗旁路信号,进而推断芯片中程序的执行路径甚至指令代码.针对微控制器(AT89C52)上实现的RSA二进制模幂算法的简单旁路模板分析验证了旁路模板分析对于推断程序执行路径的可行性,对微控制器典型指令的统计旁路模板分析实验说明了旁路模板分析在芯片指令逆向工程中的可行性. There are different power consumption leakage characters for different instructions executed in IC chips.These side channel characters can be used to construct templates for different instructions and different paths a program took at a certain time.And then the side channel signals obtained from an unknown chip would be matched with these side channel templates,and the according to the maximum likelihood theory the best matched candidate may be the most likely correct instruction or path.The simple side channel template analysis against the binary modular exponentiation implementation of RSA executed in a microcontroller(AT89C52) validated the effective of the side channel template analysis in programs′ path detection,and the static side channel template analysis against several typical instructions showed that the side channel template analysis is useful and powerful in reverse engineering for cipher chips.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第2期140-144,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60940019) 国家"八六三"计划项目(2007AA01Z454) 军械工程学院原始创新基金(YSCX0903)
关键词 逆向工程 旁路分析 模板分析 密码芯片 reverse engineering side channel analysis template analysis cipher chip
  • 相关文献

参考文献8

  • 1Paul Koeher. Timing attacks on implementations of dif- fie-bellman, RSA, DSS, and other systems[C]//Pro- ceedings Crypto '96, LCNS. New York:Springer-Ver- lag, 1996:104-113.
  • 2邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 3邓高明,张鹏,赵强,陈开颜.针对密码芯片的电磁模板分析攻击[J].微电子学与计算机,2010,27(1):1-4. 被引量:5
  • 4Martin Goldack. Side-channel based reverse engineer- ing for microcontrollers [D]. Bochum: Ruhr- Universi- ty, 2008.
  • 5Dennis Vermoen. Reverse engineering of Java card ap- plets using power analysis [D]. Netherlands: TU Delft, 2007.
  • 6Jan M Rabaey, Anantha Chandrakasan, Borivoje Nikoli.数字集成电路-电路、系统与设计[M].2版.周润德,译.北京:电子工业出版社,2004:141-166.
  • 7SungMo Kang,Yusuf Leblebiei.CMOS数字集成电路-分析与设计[M].3版.王志功,窦建华,译.北京:电子工业出版社,2005:97-98.
  • 8褚杰,赵强,丁国良,邓高明.密码系统差分功耗分析攻击及功耗模型[J].华中科技大学学报(自然科学版),2008,36(6):18-21. 被引量:7

二级参考文献34

共引文献23

同被引文献30

  • 1饶金涛,陈运,吴震,陈俊,许森.一种抗简单功耗分析攻击的模幂算法[J].成都信息工程学院学报,2011,26(2):123-126. 被引量:2
  • 2孙敦灿,陈运,万武南,索望.功耗分析平台中混合编程的应用研究[J].成都信息工程学院学报,2011,26(2):127-131. 被引量:3
  • 3KOCHER P.Timing attacks On implementations of diffe-hellman,RSA,DES,and other system[A].Proceed-ings of Advances in Cryptology-CRYPTO’96[C],1996:104-113.
  • 4DHEM J F.KOEUME F,LEROUX P A,et al.A practical implementation of the timing attack[A].Proceed-ings of CARDIS 1998[C].1998:14-16.
  • 5MESSERGES T S,DABBISH E A,SLOAN R H.Investigations of power analysis attacks on smarteards[A].Proc USENIX Workshop Smarteard Technology[C].Chicago,Illinois,USA,1999:151-161.
  • 6KOCHER P,JAFFE J,JUN B.Differential power analysis[A].Proceedings of Advances in Cryptology-CRYPTO’99[C].1999:388-397.
  • 7Suresh Chari,Josyula R.Rao,and Pankaj Rohatgi.Template Attacks[A].CHES 2002,LNCS 2523,2003:13-28.
  • 8C.Archambeau,E.Peters et al.Template Attacks in Principal Subspaces[A].CHES 2006,LNCS 4249,2006:1-14.
  • 9Francois-Xavier Standaert et al.and Cedric Archambeau.Using Subspace-Based Template Attacks to Com-pare and Combine Power and Electromagnetic Information Leakages[A].CHES 2008,LNCS 5154,2008:411-425.
  • 10O Acicmez,J P Seifert,C K Koc.Predicting secret keys via branch prediction[J].Topics in Cryptology-CT-RSA 2007.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部