期刊文献+

一种软件级双轨逻辑的完整实现方案 被引量:1

A Complete Proposal of Dual-Rail Logic on Software Level
原文传递
导出
摘要 旁路攻击是一种通过分析密码设备在运行时所产生的旁路信息来分析该密码设备的秘密信息的方法。Paul Kocher等人在1998年提出的功耗分析现在已经是针对密码设备的旁路攻击中非常常见的一种。在硬件实现的密码设备中,双轨逻辑是一种有效的抵抗功耗分析的方法,它通过用两位物理比特来表示一位逻辑比特,使数据0和1的表述对称,从而平衡了功耗的大小。对于软件实现的密码设备,也可以借鉴双轨逻辑的思路,这里给出了一个较为完备的软件级双轨逻辑方案,解决了一些前人方案的不周全指出,并之后在一个DES算法的实验中,验证方案的有效性。 Power attack, proposed by Paul Kocher in 1998, is now a common kind of side channel attack on cryptographic devices. In the hardware implementation of cryptographic algorithms, dual-rail logic is a useful method to resist the power attack. With two physical bits for expression of one logic bit, the degree of power consumption is ballanced in the processing of different data. In the software implementation of cryptographic algorithm, the same thinking could be referred to. An even more complete proposal of dual-rail logic on software level in the software implementation of cryptographic algorithms is suggested in the paper, which could solve some indaequacies of the former proposals. An experiment in software DES indicates the effectiveness of the proposal.
出处 《通信技术》 2013年第4期1-4,共4页 Communications Technology
关键词 功耗分析 双轨逻辑 双轨编码 基本逻辑门 S盒 列混淆 power attack dual-rail logic dual-rail encoding' differential power attack'basic logic gate" S-box mix column
  • 相关文献

参考文献11

  • 1KOCHER P, JAFFE J, JUN B. Differential PowerAnalysis[C]// CRYPTO, 99. Heidelberg, German:Springer-Verlag, 1999:388-397.
  • 2张剑峰,钱晶晶,谈慧宇,高进涛.智能卡抗DPA攻击的设计与实现[J].现代电子技术,2009,32(9):82-85. 被引量:3
  • 3李海斌,周玉洁.一种抗DPA攻击的DES设计[J].通信技术,2007,40(11):277-279. 被引量:9
  • 4成为,谷大武,郭筝,张雷.一种针对RSA-CRT的功耗分析攻击方法[J].通信技术,2011,44(6):123-125. 被引量:7
  • 5蒋烨,薛质,王轶骏.非接触式IC卡干扰式旁路攻击与防护[J].信息安全与通信保密,2008,30(3):52-54. 被引量:2
  • 6张修丽,陈诚.一种抗DPA的AES的设计[J].信息安全与通信保密,2009,31(11):63-65. 被引量:2
  • 7SOKOLOV D, MURPHY J, BYSTR0Y A, et al. Improvingthe Security of Dual-Rail Circuits[C]// CHES 2004.LCNS. Heidelberg, German: Springer-Verlag, 2004:255-317.
  • 8RAZAFINDRAIBE A, ROBERT M, MAURINE P. Analysis andImprovement of Dual Rail Logic as a CountermeasureAgainst DPA[C]// PATM0S 2007. LCNS. Heidelberg,German:Springer-Verlag, 2007:340-351.
  • 9H00GV0RST P, DUC G, DANGER J. SoftwareImplementation of Dual-Rail Representation [EB/OL].(2011-2-24)[2011-2-24]. http://cosade2011. cased,de/files/201l/cosade201l.talk8.paper. pdf.
  • 10BOGDANOV A, KNUDSEN L, LEANDER G at el. PRESENT:An Ultra-Lightweight Block Cipher [C]// CHES 2007.LCNS. Heidelberg, German: Springer-Verlag, 2007:450-466.

二级参考文献35

  • 1赖坤锋.智能卡SPA&DPA攻击[J].现代电子技术,2005,28(17):28-29. 被引量:3
  • 2毛丰江,温希东.智能卡攻击技术与安全策略的研究[J].计算机工程与设计,2006,27(13):2396-2399. 被引量:7
  • 3Messerges T S, Dabbish E A, Sloan R H. Investigations of Power Analysis Attacks on Smart Cards[A]. Proceeding of USENIX Workshop on Smartcard Technology [C]. 1999: 151 -161.
  • 4Messerges T. Using Second Order Power Analysis to Attack DPA Resistant Software[A]. Cryptographic Hardware and Embedded Systems[C]. Springer - Verlag, 2000 : 238 - 251.
  • 5Sibley E H. Random Number Generators: Good OnesAre Hard to Find[J]. Communications of the ACM, 1998, 31 (10) :1192 - 1201.
  • 6FIPS PUB 46 - 3, Data Encryption Standard, Federal Information Processing Standards Publication Reaffirmed 1999 October 25,U. S. Department of Commerce/National Institute of Standards and Technology.
  • 7FIPS PUB 197, Advaced Encryption Stand- ard (AES), Federal Information Processing Standards Publication Reaffirmed Nove- tuber 26,2001, U. S. Department of Commerce/National Institute of Standards and Technology.
  • 8Rivest R L, Shamir A, Adelman L M. A Method for Obtaining Digital Signatures and Public - key Crypto Systems[J].Communications of the ACM, 1978,21 : 120 - 126.
  • 9William Stallings.Cryptography and Network Security Principles and Practices[S].USA:Prentice Hall,2003.
  • 10Kullhack S.Statistical Method in Cryptanalysis[M].New York:Aegean Park Press,1976.

共引文献21

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部