期刊文献+

IC卡芯片DES加密差分功耗分析方法 被引量:2

Differential Power Analysis Method for DES Encryption in IC Card Chip
下载PDF
导出
摘要 针对IC卡芯片在数据加密标准(DES)加密运算过程中的功耗泄露问题,利用IC卡芯片的旁路功耗攻击方法,分析IC卡芯片在加密工作时的功率消耗特性,采用基于S盒输出的功耗区分函数,提出一种新的差分功耗分析(DPA)和相关性分析方法。通过Inspector平台对某款IC卡芯片的DES加密运算进行DPA攻击测试,破解DES加密密钥,结果验证了该方法的正确性。 Based on the principle of Side-channel Analysis(SCA) and power leakage of IC chip, this paper analyzes the relationship of encryption process and power leakage of IC chip. According to the problem of power leakage in chip Data Encryption Stardard(DES) encryption, it brings out power diff-function Differential Power Analysis(DPA) and correlation analysis method, which are based on S-box output. It uses Inspector platform to do DPA examinations, and is succeed in cracking the key of some chip's DES encryption. Examinations results not only prove the correctness of test method, but also find the power leakage security vulnerability of traditional DES algorithm used in IC chip.
作者 李菁 李林森
出处 《计算机工程》 CAS CSCD 2013年第7期200-204,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61071078) 信息网络安全公安部重点实验室2010年度开放课题基金资助项目
关键词 旁路分析 差分功耗分析 DES加密 S盒 功耗区分函数 相关性分析 Side-channel Analysis(SCA) Differential Power Analysis(DPA) Data Encryption Stardard(DES) encryption S-box powerdill-function correlation analysis
  • 相关文献

参考文献10

二级参考文献46

  • 1陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 2Kocher P, Jaffe J, Jun B. Differential power analysis. Cryptographic hardware and embedded systems[C]. Proc. of CRYPTO'99. LNCS1666, 1999,388-397.
  • 3Messerges T S,Dabbish E A, Sloan R H. Investigations of power analysis attacks on smartcards [C]. Usenix Workshop on Smartcard Technology, Chicago, Illinois, USA, May, 1999, 151-162.
  • 4Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations [C]. Cryptographic Hardware and Embedded Systems, LNCS 3659, Springer-Verlag, 2005, 157-171.
  • 5Charvet X, Pelletier H. Improving the DPA attack using wavelet transform[C]. Physical Security Testing Workshop, Hawaii, USA, 2005, 1-15.
  • 6Shin J H, Park D J, Lee P J. A DPA attack on the improved hamoon algorithm[C]. Proc. Workshop on Information Security Applications 2005, LNCS3786, Springer-Verlag, 2006, 283- 29L
  • 7Ha J C, Moon S J. Randomized signed-scalar multiplication of ECC to resist power attacks[C]. Proc. Of Cryptographic Hardware and Embedded Systems (CHES 2002), LNCS 2523, Springer-Verlag, 2002,551-563.
  • 8Joye M, Paillier P, Schoenmakers B. On second-order differential power analysis[C]. Proc. of Cryptographic Hardware and Embedded Systems (CHES 2005), LNCS 3659, Springer-Verlag, 2005, 293-308.
  • 9Messerges T S. Using second-order power analysis to attack DPA resistant software[C]. Proc. of Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965, Springer- Verlag, 2000,27-28.
  • 10Akkar M L, Goubin L. A generic protection against high-order differential power analysis[C]. Proc. of Fast Software Encryption (FSE2003), LNCS 2887, Springer-Verlag, 2003, 192- 205.

共引文献19

同被引文献20

  • 1周文锦,范明钰.基于掩码的差分能量分析攻击防范对策[J].计算机应用,2005,25(12):2725-2726. 被引量:2
  • 2梅振宇,张虹.基于非S盒变换的DES分组密码的改进[J].计算机工程与设计,2007,28(17):4119-4121. 被引量:5
  • 3American National Standards Institute.ANSI X3.92-1981American National Standard,Data Encryption Algorithm[S].1981.
  • 4Paul K,Joshua J,Jun B.Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Conference.Berlin,Germany:Springer,1999:388-397.
  • 5Tiri K,Verbauwhede I.Securing Encryption Algorithms Against DPA at the Logic Level:Next Generation Smart Card Technology[C]//Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems.Cologne,Germany:Springer-Verlag,2003:125-136.
  • 6Fournier J J A,Moore S,Li H Y.Security Evaluation of Asynchronous Circuits[C]//Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems.Cologne,Germany:Springer-Verlag,2003:137-151.
  • 7Guiley S,Sauvage L,Hoogvorst P,et al.Security Evaluation of WDDL and Sec Lib Countermeasures Against Power Attacks[J].IEEE Transactions on Computers,2008,57(11):1482-1497.
  • 8Trichina E,Korkishko L.Secure and Efficient AES Software Implementation for Smart Cards[C]//Proceedings of the 5th International Workshop on Information Security Applications.Jeju,Korea:SpringerVerlag,2004:425-439.
  • 9Yoshikawa M,Kojima Y.Efficient Random Number for the Masking Method Against DPA Attacks[C]//Proceedings of the 21st International Conference on Systems Engineering.Las Vegas,USA:[s.n.],2011:321-324.
  • 10Akkar M L,Giraud C.An Implementation of DES and AES,Secure Against Some Attacks[C]//Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems.Paris,France:SpringerVerlag,2001:309-318.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部