期刊文献+

AES加密设备的差分能量攻击原理与仿真 被引量:2

Principle and simulation of differential power analysis attack based on AES encryption device
下载PDF
导出
摘要 旁路攻击是目前信息安全技术领域一个备受瞩目的热点,绕过传统的密码分析方法,利用加密解密设备在进行数据处理时泄露出来的信息比,如运行时间、功耗等对密码系统进行分析和攻击。而DPA(differential power analysis)攻击是较为常见的一种旁路攻击。文中对DPA攻击和AES加密算法进行简单介绍,并在此基础上进行标准DPA攻击的仿真,为能量攻击分析提供一定的理论依据和实验数据。 Side channel attack is highly focused in the field of information security technology currently. Instead of using the traditional cryptanalysis methods, SCA uses the information such as running time, power consumption, which leaked from the process of data encrypting and decrypting to analyse and attack the encrypted system. Differential power analysis is one of the most commen form of SCA. This article presents the principles of DPA attack and AES algorithm in detail and simulates standard DPA attack based on AES algorithm and provides a theoretical basis and experimental data for energy analysis attack.
作者 黄露昀
出处 《信息技术》 2013年第12期170-173,共4页 Information Technology
关键词 旁路攻击 DPA攻击 AES算法 汉明重量模型 SCA DPA attack AES algorithm Hamming weight model
  • 相关文献

参考文献7

  • 1孙海涛,赵强,刘洁.集成电路加密芯片功耗泄漏分析[J].科学技术与工程,2006,6(21):3480-3482. 被引量:4
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[R] //Proceeding of the Advance in Cryptography(CRYPTO' 99),Santa Barbara,USA,1999.
  • 3Stefan Mangmd,Elisabeth Oswald,Thomas Popp.Power Analysis Attacks-Revealing the Secrets of Smart Cards[M].Springer,2007:97-100.
  • 4William Stallings.Cryptography and Network Security:Principles and Practices[M].Pearson Education.99-102.
  • 5樊海锋,严迎建,徐金甫,任方.AES密码芯片的相关性功耗分析仿真[J].计算机工程与设计,2010,31(2):260-262. 被引量:4
  • 6范俊波.AES算法分析及其硬件实现设计[D].成都:西南交通大学,2001:11-13.
  • 7openSCA数据包[EB/OL].http://www.cs.bris.ac.uk/home/eoswald/opensca.html.

二级参考文献12

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:15
  • 2Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C].Cryptographic Hardware Embedded System- CHES.USA:Springer-Verlag,2004:16-29.
  • 3Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations [C]. Cryptographic Hardware and Embedded Systems-CHES,7th International Workshop,2005:157-171.
  • 4Kris Tiri,Ingrid Verbauwhede.Simulation models for side-channel information leaks[C].Anaheim,California,USA:DAC,2005: 13-17.
  • 5Eric Peeters,Francois-Xavier Standaert,Jea-Jacques Quisquater. Power and electromagnetic analysis: Improved model, consequences and comparisons[J].Elsevier Science,2006(1): 1 - 16.
  • 6Christoph Herbst, Elisabeth Oswald, Stefan Mangard. An AES smart card implementation resistant to power analysis attacks [C].ACNS,2006:239-252.
  • 7[1]Kocher P,Jaffe J,Jun B.Differential power analysis.In:Proceeding of the Advances in Cryptography (CRYPTO'99),Santa Barbara,USA,1999
  • 8[2]Messerges T S,Dabbish E A,Sloan R H,Investigations of power analysis attacks on smartcards.Proceedings of USENIX Workshop on Smartcard Technology,May 1999
  • 9[3]Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model.In:eds Joye M,Quisquater J J.Cryptographic Hardware Embedded System-CHES 2004.USA,Volume 3156 of Lecture Notes in Computer Science,Springer-Verlag,2004
  • 10[4]Messerges T S,Dabbish E A,Sloan R H.Examining smartcard secu rity under the threat of power analysis attacks.IEEE Transactions on Computers,2002

共引文献6

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部