摘要
自1999年Kocher等人提出针对智能卡中DES的差分功耗攻击(DPA)以来,针对DPA的各种防御策略也被大量的提出,Masking就是其中一种简单、高效的方法。文献[2]中Akkar提出了一种改进的Masking方法,然而,本文基于实际的智能卡芯片对该方法成功进行了攻击试验。实验结果表明该方法并不能抵抗DPA的攻击。以此类推,文献[7]中提出的仅对密钥K进行掩码的方法亦不能抵抗DPA的攻击。
Since Differential Power Analysis (DPA) on DES in smartcards was firstly published by Kocher et al. in 1999, many countermeasures have been proposed to protect cryptographic algorithms from the attack, of which masking is an efficient and easily implemented method. In [2], Akkar and Giraud introduced the transformed masking method, an alternative countermeasure to the DPA. However, in this paper, authors conducted a successful Differential Power Analysis DPA attacks on a Triple Data Encryption Standard TDES hardware implementation on smartcard. The experiment resuits prove that the transformed masking method is not sufficiently to resist the attack of DPA and the same, the DES implementation of masking on key in [7] will also be vulnerable to the corresponding attacks above.
出处
《北京电子科技学院学报》
2011年第4期35-41,共7页
Journal of Beijing Electronic Science And Technology Institute
基金
发改委集成电路设计专项项目"高安全金融社保卡芯片开发及产业化"发改办高技【2011】847号