期刊文献+

取样电阻对功耗分析攻击的影响

The Impacts of the Sampling Resistance on the Power Consumption Analysis Attack
下载PDF
导出
摘要 针对目前针功耗分析攻击的影响因素研究偏少的情况,讨论和分析了取样电阻对功耗分析攻击的影响。功耗分析攻击的研究对象是功耗曲线,现有常见实验平台采集的通常是包括各种噪声的功耗综合。取样电阻作为功耗分析平台中的一部分,会在电阻噪声和功耗区分度两方面造成影响,进而影响到功耗分析攻击的正确率。因此为了提高攻击正确率,在不影响区分度的前提下可选用相对小的电阻。 According to the current situation that the research of the influence factors of power analysis attack is less than expected, this paper discusses and analyzes the impacts of the sampling resistance of power analysis attack. The study object of power analysis attack is power curves, and the data collected in present popular experimental platforms is power consumption concluding much noise. The sampling resistance as part of the power analysis platform will influence the power analysis attack in resistance noise and power discrimination two sides, and further affect the accuracy rate of power consumption analysis attack. So, on the premise of discrimination, the increased accuracy rate will be achieved by choosing the smaller resistance.
出处 《成都信息工程学院学报》 2012年第4期364-367,共4页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 四川省科技攻关重点基金资助项目(2012GZ0017) 四川省应用基础研究基金资助项目(2011JY0100)
关键词 密码学 功耗分析攻击 取样电阻 电阻噪声 cryptanalysis power consumption analysis attack sampling resistance resistance noise
  • 相关文献

参考文献12

  • 1P Kocher, J Jaffe, B Jun, Differential power analysis [ J ]. CRYTO 1999,Lecture Notes in ComputerScience,1999,1666:388-397.
  • 2MESSERGES T S,DABBISH E A,SLOAN R H. Investigations of power analysis attacks on smartcards[A].Proc USENIX Workshop Smart card Technology [C]. Chicago, Illinois, USA, 1999:151 - 161.
  • 3J R Rao,P Rohatgi. EM powering Side-Channel Attacks[R]. preliminary technical report,IBMT.J. WatsonResearch Center, May 2001.
  • 4Biham E, Shamir A. Differential Fault Analysis of Secret Key Cryptosystems[C]. Proc. Of Crypto,97. SantaBarbara, California,USA; [s. n. ]. 1997.
  • 5Liu Shubo,Tang ming,Gao Si,et al. Evolution Cipher against Differential Power Attack[J]. International Jour-nal of Digital Content Technology and its Applications, 2010,4(7) : 177 — 189.
  • 6Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power Analysis Attacks. Revealing the Secrets of SmartCards Advances in Information Security[M]. Springer,2007.
  • 7S M Yen,W C Lien,S J Moon,et al. Power analysis by exploiting chosen message and internal collisions vulnerability ofchecking mechanism for RSA-decrytion[J]. Lecture Notes in Computer Science,2005,3715 : 183 — 195.
  • 8CHEN Ai-dong, Wang Juan,XU Sen. Chosen-message Power Analysis Attack Based on the Hamming WeightModel[J]. International Journal of Digital Content Technology and its Applications,2012,6(10):28-34.
  • 9Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann. Evaluating Resistance of MCML Technology toPower Analysis Attacks Using a Simulation-Based Methodology [ J ]. Lecture Notes in Computer Science,2009,Volume 5430/2009,230 - 243.
  • 10S V Revenko, A S Borovik, Yu V Makhan’kov. Selection of intact fine nerve strands using power spectrum oftheir electrical noise[j]. BULLETIN OF EXPERIMENTAL BIOLOGY AND MEDICINE Volume 2000,130(2):743-745.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部