期刊文献+

针对FPGA密码芯片的近场差分电磁分析攻击 被引量:1

Differential ElectroMagnetic analysis attacks on FPGA cipher chip in near field
下载PDF
导出
摘要 为探究现场可编程门阵列(FPGA)密码芯片运行时电磁辐射造成的涉密信息泄漏情况,研究了互补金属氧化物半导体(CMOS)电路直接电磁辐射的原理,构建了FPGA密码芯片的近场电磁辐射模型。根据这个模型,探讨了近场电磁辐射测量点的选取,采用电磁扫描的方法解决了电磁探头在FPGA表面电磁信号采集的定位问题。此外,在阐释了差分电磁分析(DEMA)攻击原理的同时,完成了高级加密标准(AES)的FPGA电路设计,针对FPGA密码系统的DEMA攻击实验表明,通过电磁扫描找到最佳测量点,在42 000个样本的条件下能成功破解AES密码电路的128 bit密钥。 To do research for physical information leaked by Electromagnetic(EM)radiations from Field Programmable Gate Arrays(FPGA)cipher chip during its operation,this paper analyzes the principle of direct electromagnetic emanations for Complementary Metal-Oxide-Semiconductor(CMOS)circuit,and then a near-feld leakage model about FPGA is designed.According to this model,the technique,EM scanning,is used to tackle the problem of the localization of the spatial position of the cryptoprocessor,in putting an electricmagnetic near-feld sensor above the chip.Moreover,Advanced Encryption Standard(AES)circuit is completed based on FPGA cryptosystem and Differential ElectroMagnetic Analysis(DEMA)is introduced.As a result,practical experiment has shown that an attacker can extract the secret 128-bit key using 42000 traces of AES cryptographic device under the condition of having localized the optimal leaking spots characterized by mostly data-dependent EM emissions.
出处 《计算机工程与应用》 CSCD 2013年第18期89-93,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.60940019) 河北省自然科学基金(No.F2012506008) 军械工程学院原始创新基金(No.YSCX0903)
关键词 密码芯片 近场 电磁辐射 差分电磁分析 高级加密标准 现场可编程门阵列 cipher chip near-field Electromagnetic(EM)radiations Differential ElectroMagnetic Analysis(DEMA) Advanced Encryption Standard(AES) Field Programmable Gate Arrays(FPGA)
  • 相关文献

参考文献7

  • 1Zhou Yongbin,Feng Dengguo.Side-channel attacks:ten years after its publication and the impacts on cryptographic module security testing[EB/OL].[2011-10-26].http://eprint.iacr.org/2005/388.pdf.
  • 2Prpic M.Reverse engineering of Java card applets[D].Faculty of Informatics,Masaryk University,Brno,2010.
  • 3Agrawal D,Archambeault B,Rao J R,et al.The EM side-channel(s):attacks and assessment methodologies[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES),2003,2523:29-45.
  • 4张三慧.电磁学[M].北京:清华大学出版社,1999(第二版)..
  • 5Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C]//Cryptographic Hardware Embedded System-CHES 2004.Boston:Springer-Verlag,2004:16-29.
  • 6National Institute of Standards and Technology.FIPS-197 Advanced encryption standard[S].Gaithersburg:National Institute of Standards and Technology,2001.
  • 7邹程,张鹏,邓高明,赵强.AES密码电路抗差分功耗分析设计[J].计算机工程与应用,2009,45(36):63-65. 被引量:2

二级参考文献5

  • 1Kocher P,Jaffe J,Jun B.Differential power analysis[C]//Wiener M. Lecture Notes in Computer Science 1666:Advances in Cryptology, Proceedings of CRYPTO'99.Santa Barbara,CA,USA:Springer-Verlag, 1999 : 388-397.
  • 2Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C]//Joye M,Quisquater J J.Leeture Notes in Computer Science 3156:Cryptographic Hardware Embedded System- CHES 2004,USA.[S.l.]:Springer-Verlag,2004: 16-29.
  • 3Standaert F X,Ors S B,Preneel B.Power analysis of an FPGA implementation of Rijndaehis pipelining a DPA ?[c]// Joye M,Quisquater J J.Lecture Notes in Computer Science 3156 Cryptographic Hardware Embedded System-CHES 2004. [S.l.] Springer-Verlag, 2004 : 30-44.
  • 4Ors S B,Gurkaynak F,Oswald E,et al.Power-analysis attack on an ASIC AES implementation[C]//IEEE International Conference on Information Technology:Coding and Computing(ITCC'04).Las Vegas: IEEE, 2004,2 : 546.
  • 5Murphy S.The Advanced Encryptian Standard (AES)[J].Information Security Technical Report, 1999,4(4) : 12-17.

共引文献20

同被引文献12

  • 1KOCHER P C. Timing attacks on implementations ofdiffie-hellman, RSA,DSS,and other systems [C]//CRYPTO. Berlin: Springer, 1996: 104-113.
  • 2KOCHER P C,JAFFE J, JUN B. Differential poweranalysis [C]//CRYPTO. Berlin: Springer, 1999 :388-397.
  • 3QUISQUATER J,SAMYDE D. Electromagnetic a-nalysis ( EM-A ) : measures and countermeasures forsmart cards [C]//E-Smart. Berlin: Springer, 2001 :200-210.
  • 4"冯赞.针对单片机的电磁模板攻击的研究[D].西安:西安电子科技大学,2010.
  • 5CARLIER V,CHABANE H,DOTTAX E, et al. E-lectromagnetic Side Channels of an FPGA Implemen-tation of AES[R/OL]. 2004 [2014-10-21], http://eprint. iacr. org/2004/145. pdf.
  • 6DE MULDER E, BUYS SCHAERT P, ORS S B,etal. Electromagnetic analysis attack on an FPGA im-plementation of an elliptic curve cryptosystem [C]//The International Conference on IEEE Computer as aTool,2005, 2:1879-1882.
  • 7GEBOTYS C H, HO S, TIU C C. EM Analysis ofRijin-dael and ECC on a Wireless Java based PDA[M]. Berlin: Springer, 2005 : 250-264.
  • 8HOMMA N’NAGASHIMA S,IMAI Y,et al. Highresolution side-channel attack using phase basedwave-form matching[C]//CHES, 2006, 4249 * 187-200.
  • 9冯登国,周永彬,刘继业,等.能量分析攻击[M].北京:科学出版社,2009.
  • 10邹程,张鹏,邓高明,赵强.差分功率分析攻击中的信号对齐方法研究[J].微电子学与计算机,2009,26(7):227-229. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部