期刊文献+

差分功耗分析攻击下密码芯片风险的量化方法

Value-at-risk quantitative method about password chip under differential power analysis attacks
下载PDF
导出
摘要 针对差分功耗分析(DPA)攻击的原理及特点,利用核函数估算密码芯片工作过程中功耗泄漏量的概率分布密度,通过计算密钥猜测正确时攻击模型与功耗泄漏量之间的互信息熵,将密码芯片在面对DPA攻击时所承受的风险进行了量化。实验表明,该风险量化方法能够很好地估算出密钥猜测正确时攻击模型与功耗泄漏量之间的相关度,并为完整的密码芯片风险分析提供重要指标。 Based on the principle and characteristics of the Differential Power Analysis (DPA) attack, the kernel function was used to estimate the probability distribution density of the leakage of power consumption in the password chip work process. By calculating the mutual information between the attack model and the power leakage, when the guessed key was correct, this paper quantified the risk value of the password chip in the face of DPA attacks. The experiments show that the risk quantification method can be a good estimate of the correlation degree between the attack model and power leakage when the guessed key is correct and then provides important indicators to complete password chip risk evaluation.
机构地区 信息工程大学 [
出处 《计算机应用》 CSCD 北大核心 2013年第6期1642-1645,共4页 journal of Computer Applications
关键词 差分功耗分析攻击 风险值量化 核函数 互信息熵 密码芯片 Differential Power Analysis (DPA) attack value-at-risk quantification kernel function mutual informationentropy password chip
  • 相关文献

参考文献12

二级参考文献46

  • 1李鹤田,刘云,何德全.信息系统安全风险评估研究综述疆[J].中国安全科学学报,2006,16(1):108-113. 被引量:35
  • 2姬东朝,宋笔锋,喻天翔.模糊层次分析法及其在设计方案选优中的应用[J].系统工程与电子技术,2006,28(11):1692-1694. 被引量:47
  • 3王伟,李春平,李建彬.信息系统风险评估方法的研究[J].计算机工程与设计,2007,28(14):3473-3475. 被引量:16
  • 4Mangard S. A simple power analysis(SPA) attack on implementations of the AES key expansion [ C ]// ICISC2002. Seoul, Korea: Lecture Notes in Computer Science, 2002 : 343-358.
  • 5Bogdanov A, Kizhvatov I, Pyshkin Pu Algebraic meth- ods in side--channel collision attacks and practical colli- sion detection[C]// Indocrypt2008. Kharagpur, India: LNCS, 2008: 51- 265.
  • 6Bogdanov A. Improved side--channel collision attacks on AES [C]// SAC2007. Ottawa, Canada.. LNCS, 2007 : 84- 95.
  • 7Renauld M, Standaert F -- X. Algebraic side-channel attacks[-EB/OL]. [2010-03-13]. Cryptology ePrint Archive, report 2009/179, http://eprint, iacr. org/ 2009/279.
  • 8Renauld M, Standaert F X, Veyrat Charvillon N. A1- gerbaic side--Channel Attacks on the AES: Why Time also Matters in DPA[C]// CHES 2009, Switzerland: Lecture Notes in Computer Science, 2009 : 97- 111.
  • 9Stefan Mangard,Elisabeth Oswald Thomas Popp.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2009,11.
  • 10T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Investigations of Power Analysis Attacks on Smartcards [EB/OL], http: // www. usenix, org/. 1999.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部