期刊文献+

抗功耗攻击的随机插入式分组密码系统

A power analysis resistant block cipher cryptosystem with a macroscopic view of random operation insertions
下载PDF
导出
摘要 近年来涌现出许多抗功耗分析的方法,例如双轨电路法、掩码法和随机操作插入法。仔细分析这些方法可以发现它们都有潜在的缺陷,这些缺陷使得这些方法大都受制于大量的数据统计(包括高阶数据统计)。提出了一种在分组密码加解密过程中加入伪轮函数的方法。伪轮函数的加入使得加解密过程具有不可重复性,从而给功耗分析带来很大的麻烦。用51单片机仿真了这个设计,并进行了相关的功耗分析,结果显示该设计能很好地抵制功耗分析。 In recent years,many countermeasures against power analysis are proposed,such as the dual-rail technique,the masking technique and the dummy operation insertion technique.Close scrutiny of them reveals that they all have potential pitfalls and are vulnerable to statistical analysis(including high-order statistical analysis).This paper proposes a novel cryptosystem which brings forward a new structure making use of random dummy round-function blocks during encryption/decryption process.The cryptosystem makes the encryption/decryption process unfixed and unrepeatable,which brings much trouble to DPA data analysis.It designs to 51-microcontroller and makes power analysis experiments on the cryptosystem.It proves to be strongly resistant against power analysis.
出处 《信息技术》 2011年第9期68-70,75,共4页 Information Technology
关键词 差分功耗分析 AES加密系统 随机插入 轮函数 differential power analysis AES cryptosystem random insertion round-function
  • 相关文献

参考文献12

  • 1Paul Kocher, Joshus Jaffe, and Benjamin Jun. Differential Power Analysis[ C]// proceeding of CRYPTO 99, 1999:388 -397.
  • 2Benini L, et al. Energy -Aware Design Techniques for Differential Power Analysis Protection [ C ]// proceeding of Design Automation Conference,2003 : 36 - 41.
  • 3Chari S, Jutla C, Rao J R, et al. A cautionary note regarding evaluation of aes candidates on smart-cards[ C ]//proceeding of The Second AES Candidate Conference, 1999:133 -147.
  • 4Chari S, Jutla C, Rao J R, et al. Towards sound approaches to counteract power-analysis attacks[ C ]//proceeding of CRYPTO 99, 1999:398 -412.
  • 5Goubin L, Patarin J. DES and Differential Power Analysis - the Duplication Method [ C ]// proceeding of CHES 99, 1999 : 158 - 172.
  • 6Kris Tiff, Ingrid Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology [ C ]//proceeding of CHES 2003, 2003:125 - 136.
  • 7Akkttr M L, Bevan R, Dischamp P, et al. Power analysis, what is now possible[ C ]//proceeding of Asiacrypt00, 2000:489 - 502.
  • 8Barbosa M, Page D. On the automatic construction of indistinguisha- ble operations [ C ]// Cryptography and Coding, 2005 : 233 - 247, 2005.
  • 9Gebotys C H, Gebtys R J. Secure elliptic curve implementations: Analysis of resistance to power-attacks in a dsp processor [ C ]//. proceeding of CHES02,2002 : 114 - 128.
  • 10Lu Y. FPGA Implementation and Analysis of Random Delay Insertion Countermeasure against DPA [ C ]// proceeding of FPT "08, 2008:201 - 208.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部