期刊文献+

抗差分能量攻击的DES加密芯片设计(英文)

A Design of DES Encryption Chip with Resistance to Differential Power Analysis
下载PDF
导出
摘要 提出将掩码和随机延时两种策略综合的方法以增强加密算法的抗攻击性能,同时,提出一种多掩码方案取代传统的单一掩码,进一步增强抵御以汉明重量为模型的能量攻击。此综合策略应用于DES加密设备,结果表明,能够成功抵御105条能量迹攻击,抗攻击性能提高40%。 The authors propose a novel countermeasure which associates masking with RDI (random delay in- sertion). Further, multi-masking instead of transformed masking is proposed in order to defend DPA (differential power analysis) attack based on Hamming distance model. The combined countermeasure is implemented on Data Encryption Standard. The results show that combined countermeasure can defend DPA attack with 105 power traces, and increase 40% ability against DPA attack.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第4期675-680,共6页 Acta Scientiarum Naturalium Universitatis Pekinensis
关键词 差分能量攻击 DES 多掩码 随机延时 组合策略 DPA DES multiple masking RDI combined countermeasure
  • 相关文献

参考文献8

  • 1Kocher P,Jaffe J,Jun B.Differential power analysis//CRYPTO'99.New York:Springer-Verlag,1999:388-397.
  • 2Li Huiyun,Wu Keke,Yu Fengqi.Enhanced correlation power analysis attack againsttrusted systems.Security Comm Networks,2011,4:3-10.
  • 3Han Yu,Zou Xuecheng,Liu Zhenglin,et al.Efficient DPA attacks on AES hardware implementations.I J Communications,Network and System Sciences,2008,1:68-73.
  • 4Akkar M,Giraud C.An implementation of DES and AES,secure against some attacks//Proc of CHES.Heidelberg:Springer,2001:309-318.
  • 5Clavier C,Coren J,Dabbous N.Differential power analysis in the presence of hardware countermeasures//Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2000:252-263.
  • 6Bucci M,Luzzi R,Guglielmo M,et al.A countermeasure against differential power analysis based on random delay insertion.Circuits and Systems,ISCAS 2005,4:3547-3550.
  • 7Lu Yingxi,O'Neill M P,McCanny J V.FPGA implementation and analysis of random delay insertion countermeasure against DPA//International Conference on ICECE Technology.Taipei,2008:201-208.
  • 8Maghrebi H,Guilley S,Danger J L.Formal security evaluation of hardware Boolean masking against second-order attacks//Hardware-Oriented Security and Trust(HOST).IEEE International Symposium,2011:40-46.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部