期刊文献+

针对改进的Masking方法的差分功耗攻击 被引量:1

DPA Attacks on Transformed Masking Method
下载PDF
导出
摘要 自1999年Kocher等人提出针对智能卡中DES的差分功耗攻击(DPA)以来,针对DPA的各种防御策略也被大量的提出,Masking就是其中一种简单、高效的方法。文献[2]中Akkar提出了一种改进的Masking方法,然而,本文基于实际的智能卡芯片对该方法成功进行了攻击试验。实验结果表明该方法并不能抵抗DPA的攻击。以此类推,文献[7]中提出的仅对密钥K进行掩码的方法亦不能抵抗DPA的攻击。 Since Differential Power Analysis (DPA) on DES in smartcards was firstly published by Kocher et al. in 1999, many countermeasures have been proposed to protect cryptographic algorithms from the attack, of which masking is an efficient and easily implemented method. In [2], Akkar and Giraud introduced the transformed masking method, an alternative countermeasure to the DPA. However, in this paper, authors conducted a successful Differential Power Analysis DPA attacks on a Triple Data Encryption Standard TDES hardware implementation on smartcard. The experiment resuits prove that the transformed masking method is not sufficiently to resist the attack of DPA and the same, the DES implementation of masking on key in [7] will also be vulnerable to the corresponding attacks above.
出处 《北京电子科技学院学报》 2011年第4期35-41,共7页 Journal of Beijing Electronic Science And Technology Institute
基金 发改委集成电路设计专项项目"高安全金融社保卡芯片开发及产业化"发改办高技【2011】847号
关键词 智能卡芯片 相关性分析 掩码技术 三重加密标准 差分功耗攻击 smartcard chip correlation analysis technique masking TDES DPA
  • 相关文献

参考文献7

  • 1P. Kocher, J. Jaffe, and B. Jun, Differential power analysis[C]. Proc. of Advances in Cryptology-CRYPTO 1999 (M. Wiener, ed.), LNCS, vol. 1666, Springer-Verlag, 1999, pp: 388-397.
  • 2M. Akkar and C. Giraud, An Implementation of DES and AES Secure against Some Attack,[C] Proceedings of CHES01, LNCS 2162, Springer-Verlag, 2001.
  • 3Eric Brier, Christophe Clavier, Francis Olivier. Correlation power analysis with a leakage model I-C]. Cryptographic Hardware and Embedded Systems CHES 2004. Berlin: Springer, LNCS 2004 (3156) :16-29.
  • 4Najeh Kamoun, Lilian Bossuet, Adel Ghazei. Experimental implementation of DPA attacks on AES design with flashbased FPGA technology[C]. International Multi-Conference on Systems, Signals and Devices, 6th 2009.
  • 5D. Agrawal, JR Rao, P Rohatgi. Multi-channel attacks[C]. In. C Walter, C Par editors. Proceedings of the fifth international workshop on CHES. Lecture notes in computer science, vol. 2779. Cologne, Germany: SpringerVerlag2003.
  • 6Gebotys C, Ho S, Tiu A. EM analysis on Rijindael and ECC on a PDA[C]. Proc. of CHES. U K, 2005.
  • 7蒋惠萍,毛志刚.一种抗差分功耗攻击的改进DES算法及其硬件实现[J].计算机学报,2004,27(3):334-338. 被引量:20

二级参考文献9

  • 1[1]Data Encryption Standard. Federal information processing standard (FIPS) Publication 46. National Bureau of Standards, US Department of Commerce, Washington DC, 1977
  • 2[2]Menezes A.,van Oorschot P. ,Vanstone S..Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996
  • 3[3]Anderson, Kuhn M. G.. Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, Paris, 1997, 125~136
  • 4[4]Anderson R. J., Kuhn M. G.. Tamper resistance--a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland California, 1996, 1~11
  • 5[5]Kocher P., Jaffe J., Jun B.. Differential power analysis. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA, USA, 1999, 388~397
  • 6[6]Messerges T. S., Dabbish E. A., Sloan R. H.. Investigations of power analysis attacks on smartcards. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, 1999, 151~161
  • 7[7]Chari S., Jutla C., Rao J., Rohatgi P.. Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA,USA,1999, 398~412
  • 8[8]Kelsey J., Schneier B., Wagner D., Hall C.. Side channel cryptanalysis of product ciphers. In: Proceedings of, ESORICS'98, Louvain-La-Neuve, Belgium, 1998, 97~110
  • 9[9]Messerges T. S.. Securing the AES finalists against power analysis attacks. In: Proceedings of the Fast Software Encryption Workshop 2000, New York, 2000, 150~164

共引文献19

同被引文献15

  • 1张涛,范明钰,王光卫,鲁晓军.Smartcard上椭圆曲线密码算法的能量攻击和防御[J].计算机工程,2007,33(14):125-127. 被引量:10
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[C]//Proceedings of Advances in CRYPTO99,LNCS 1666,Springer-Verlag,Berlin Heidelberg,1999:388-397.
  • 3Wu K,Li H,Yu F.Retrieving lost efficiency of scalar multiplications for resisting against side-channel attacks[J].Journal of computers,2010,5(12):1878-1884.
  • 4Goron J S.Resistance against differential power analysis for elliptic curve cryptosystems[C]//Cryptographic Hardware and Embedded Systems(CHES’04),LNCS 1717,Springer-Verlag,Berlin,1999:292-302.
  • 5Gobin L.A refined power analysis attack on elliptic curve cryptosystems[C]//Public Key Cryptography 2003,LNCS 2567,Springer-Verlag,2003.
  • 6Mamiya H,Miyaji A,Morimoto H.Efficient countermeasures against RPA,DPA,and SPA[C]//Cryptographic Hardware and Embedded Systems(CHES’04),LNCS 3156,Springer-Verlag,2004:343-356.
  • 7Dimitrov V S,Jullien G A,Miller W C.Theory and applications for a double-base number system[J].IEEE Transactions on Computers,1999,48(10):1098-1106.
  • 8李浪,李仁发,Edwin H.-M.Sha.安全SoC抗功耗攻击研究综述[J].计算机科学,2009,36(6):16-18. 被引量:14
  • 9Zhang Tao,Fan Mingyu,Zheng Xiaoyu.Secure and efficient elliptic curve cryptography resists side-channel attacks[J].Journal of Systems Engineering and Electronics,2009,20(3):660-665. 被引量:8
  • 10王正义,赵俊阁.ECC抗功率分析攻击的等功耗编码算法[J].计算机工程,2012,38(10):111-113. 被引量:5

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部