期刊文献+

D函数构造法及其对DES差分能量攻击的影响分析 被引量:2

Creation of Function D and Effect Analysis in DES Differential Power Analysis Attacks
下载PDF
导出
摘要 在对密码芯片进行差分能量攻击时,不同的D函数(分割函数)构造法会影响攻击所需的样本量及其效果。针对数据加密标准(DES)密码芯片,构造不同的D函数,采用三种差分功耗攻击方式对其进行攻击实验,并对比分析实验结果。给出了针对串行工作模式的微控制器、不同内部设计结构的现场可编程门阵列(FPGA)、实际商用智能IC卡进行差分能量攻击时,最佳的D函数构造方式。分析结果有助于解决在针对实际DES密码芯片的差分能量攻击时,由于假峰影响而误判正确密钥,导致攻击成功率较低的问题,同时对其他密码算法芯片的D函数构造提供了指导。 Abstract: The number of traces and the effectiveness of attacks are affected by creation ways ot the division iunction (function D) in dil- ferential power analysis attacks. According to cipher Chip where Data Encryption Standard (DES) circuit is implemented, experiments that u- sing three kinds of Differential Power Analysis (DPA) are done. At the same time, the experimental results are compared and analyzed. The optimal ways for attack on mierocontroller with serial structures, Field Programmable Gate Arrays (FPGA) with different designs and com- mercial smart card are given. As a result, it is concluded that these analysis provide the basis for creation ways of the function D in other cryptographic chips where different algorithms are executed.
出处 《计算机测量与控制》 CSCD 北大核心 2012年第7期1967-1970,1973,共5页 Computer Measurement &Control
基金 国家自然科学基金(60940019) 河北省自然科学基金(F2012506008) 军械工程学院原始创新基金(YSCX0903)
关键词 密码芯片 旁路攻击 差分能量攻击 数据加密标准 分割函数 cipher chip side channel attacks differential power analysis attacks DES function D
  • 相关文献

参考文献7

  • 1Agrawal D, Archambeault B, Rao J R, et al. The EM side-chan- nel (s): Attacks and assessment methodologies [A]. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002), LNCS [C]. vol. 2523: 29-45. Springer, 2003.
  • 2陈开颜,赵强,张鹏,邓高明.数据加密标准旁路攻击差分功耗仿真分析[J].计算机测量与控制,2007,15(2):222-223. 被引量:7
  • 3Th. S. Messerges. Using second-order power analysis to attackDPA resistant software [A]. in Cetin K. Koc and Paar, Crypto- graphic Hardware and Embedded Systems- CHES 2000 [C]. Springer-yVerlag, August 2000, Lectures Notes in Computer Sci- ence (LNCS) 1965: 238-251.
  • 4J. Borst. Block Ciphers, Design, Analysis and Side-Channel Anal- ysis [D]. PhD thesis, Department Elektrotechniek, Katholieke Universiteit Leuven, Belgium, Sep 2001.
  • 5张鹏,邓高明,邹程,赵强.差分功率分析攻击中的信号处理与分析[J].微电子学与计算机,2009,26(11):1-4. 被引量:8
  • 6Research Center for Information Security, National Institute of Ad- vanced Industrial Science and Technology. Power Analysis Attacks on SASEBO [R], January 6, 2010.
  • 7Michael Tunstall, Neil Hanley, Robert P. McEvoy, et al. Correla- tion Power Analysis of Large Word Sizes [A]. Department of Elec- trical Engineering University College Cork, IRELAND. ISSC 2007 [C]. Derry. September 13-14.

二级参考文献9

  • 1石伟,戴葵,童元满,龚锐.防DPA攻击的标准单元库的设计与实现[J].微电子学与计算机,2007,24(2):51-54. 被引量:4
  • 2Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [ J ]. Lecture Notes in Computer Science, 1999(1666) :388-397.
  • 3Eric Brier, Christophe Clavier, Francis Olivier. Corrdation power analysis with a leakage model [C]//Cryptographic Hardware and Embedded Systems - CHES 2004. Berlin: Springer, LNCS 3156, 2004:16-29.
  • 4Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 10 11]. http://www, impan, gov. pl/BC/Program/conferences/07Crypt - ahs/Aumonier% 20 - % 20SubmissionWorkshopSA. pdf.
  • 5Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks - revealing the secrets of smart cards [M]. USA:Springer, 2007:61-65.
  • 6Joan Daemen, Vincent Rijmen. The design of rijndael: AES- the advanced encryption standard [ M ]. Berlin: Springer- Verlag, 2002.
  • 7Kocher P,Jatte J,Jun B.Differential power analysis[A].Wiener M,editor.Advances in Cryptology:Proceedings of CRYPTO' 99[C].Volume 1666 in Lecture Notes in Computer Science,Santa Barbara,CA,USA,Springer-Verlag 1999,388-397.
  • 8Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[A].Joye M,Quisquater J J,editor.Cryptographic Hardware Embedded System-CHES 2004[C].USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004,16-29.
  • 9Messerges T S,Dabbish E A,Sloan R H.Examining smartcard security under the threat of power analysis attacks[J].IEEE Transactions on Computers,2002,51 (5):541-552.

共引文献13

同被引文献12

  • 1MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 2Kocher P C. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems [ C ]//International Crytology Conference. 1996 : 104 - 113.
  • 3Mangard S, Oswald E, Popp T. Power Analysis Attacks : Re- vealing the Secrets of Smart Cards [ M ]. Berlin: Springer, 2007.
  • 4Meynard O, Guilley S, Danger J L, et al. Far correlation- based EMA with a precharacterized leakage model [ C ]//De- sign,Automation and Test in Europe Conference & Exhibi- tion(DATE). 2010:977 -980.
  • 5Doget J, Prouff E, Rivain M, et al. Univariate side channel at- tacks and leakage modeling[ J ]. Journal of Cryptographic En- gineering,2011,1 ( 2 ) : 123 - 144.
  • 6De Mulder E. Electromagnetic techniques and probes for side-channel analysis on cryptograph device [ D ]. Leuven: Katholieke Universiteit Leuven,2010.
  • 7HennessyJL,PattersonDA.计算机系统机构--量化方法的研究[M].3版.郑伟民,汤志忠,汪东升,等,译.北京:电子工业出版社,2004.
  • 8张鹏,邓高明,赵强,陈开颜.基于Cache行为的旁路攻击[J].计算机工程,2008,34(21):20-22. 被引量:4
  • 9张鹏,邓高明,邹程,赵强.差分功率分析攻击中的信号处理与分析[J].微电子学与计算机,2009,26(11):1-4. 被引量:8
  • 10金林鹏,董军.面向临床心电图分析的深层学习算法[J].中国科学:信息科学,2015,45(3):398-416. 被引量:36

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部