期刊文献+

FPGA密码芯片改进掩码防护方法研究 被引量:2

Research on improved masking technique based on FPGA cryptographic chip
下载PDF
导出
摘要 功耗攻击已对密码芯片物理安全性构成严峻威胁,对其攻击和防御的研究是密码旁路分析的热点问题。文中给出了一种DES伪随机掩码算法的设计和实现方法,分析了算法抗功耗攻击的安全性。结果表明:一般的DES伪随机掩码算法只能抵抗一阶差分功耗攻击,不能有效防御二阶差分功耗攻击。为抵御二阶DPA攻击,采用掩码方法对DES掩码算法结构进行了改进,在理论上具有抗DPA攻击的能力。 Power attack has posed serious threats to the physical security of cryptographic chips, the research of its attack and defense techniques is a hot spot in side channel attacks. The design and implementation of a DES random masking algorithm against power attack is described in this paper, and the security of this masking algorithm is analyzed. The results demonstrate that: the general masking algorithm only can defend one order differential power attack, but can not defend the second order power attack effectively. To defending the second order power attack, after applying the masking technique on DES,it improves the DES hardware structure with the ability of the DPA resistance in theory.
出处 《信息技术》 2011年第11期31-33,共3页 Information Technology
基金 国家863项目(2007AA01Z454) 国家自然科学基金项目(60571037)
  • 相关文献

参考文献2

二级参考文献44

  • 1韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 2赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 3童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 4Kocher P, Jaffe J, Jun B. Differential power analysis. Cryptographic hardware and embedded systems[C]. Proc. of CRYPTO'99. LNCS1666, 1999,388-397.
  • 5Messerges T S,Dabbish E A, Sloan R H. Investigations of power analysis attacks on smartcards [C]. Usenix Workshop on Smartcard Technology, Chicago, Illinois, USA, May, 1999, 151-162.
  • 6Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations [C]. Cryptographic Hardware and Embedded Systems, LNCS 3659, Springer-Verlag, 2005, 157-171.
  • 7Charvet X, Pelletier H. Improving the DPA attack using wavelet transform[C]. Physical Security Testing Workshop, Hawaii, USA, 2005, 1-15.
  • 8Shin J H, Park D J, Lee P J. A DPA attack on the improved hamoon algorithm[C]. Proc. Workshop on Information Security Applications 2005, LNCS3786, Springer-Verlag, 2006, 283- 29L
  • 9Ha J C, Moon S J. Randomized signed-scalar multiplication of ECC to resist power attacks[C]. Proc. Of Cryptographic Hardware and Embedded Systems (CHES 2002), LNCS 2523, Springer-Verlag, 2002,551-563.
  • 10Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis[C]. Proc. of Cryptographic Hardware and Embedded Systems (CHES 2005), LNCS 3659, Springer-Verlag, 2005, 293-308.

共引文献14

同被引文献12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部