期刊文献+

近红外激光故障注入系统在密码芯片攻击中的应用 被引量:4

The Application of Near-infrared Laser Fault Injection System in Crypto-chip Attack
下载PDF
导出
摘要 首先概括了当前流行的密码芯片攻击方法及优缺点,然后介绍了近红外激光故障注入系统,并详细描述了近红外激光故障注入理论、系统组成、工作原理,及实验设备与参数。以DES(data encryption standard)算法为例,通过数学推导,采用DFA(differential fault analysis)方法恢复密钥。最后,根据实验室搭建的近红外激光故障注入系统对芯片背面进行了故障攻击实验,在无任何防御措施下获取了DES算法密钥。通过实验,以及结合对有关防御方法的深入分析,展示了近红外激光故障注入攻击对密码芯片的具大威胁。 According to the advantages and disadvantages of the present popular attack methods,the near-infrared laser fault injection system is established to implement the fault injection analysis.Then,the basic theory of the near-infrared laser fault injection,system structure,work principle,experiment devices and parameters,are described.And the DES (data encryption standard) algorithm is exampled for introducing how to use the differential fault analysis method to retrieve the key by mathematical deduced.Finally,the near-infrared laser fault injection system,which is established by our lab,is utilized to perform the attack experiment on the back side of the security chip,and the DES algorithm key is obtained without any countermeasures.Combined with the deep analysis for the relation countermeasures,this experiment shows the powerful threat which comes from the near-inflared laser fault injection attack.
出处 《科学技术与工程》 北大核心 2014年第22期225-230,共6页 Science Technology and Engineering
基金 国家电网公司科技项目(XX17201200048)资助
关键词 近红外激光 密码芯片 故障注入攻击 DFA DES算法 near-infrared laser crypto-chip fault injection attack differential fault analysis data encryption standard
  • 相关文献

参考文献16

  • 1乐大珩.抗功耗攻击的密码芯片电路级防护关键技术研究.长沙:国防科技大学,2011.
  • 2Kocher P.Timing attacks on implementations of Die-Hellman,RSA,DSS,and other systems,in Proc of Cyrpto'96,LNCS1109,Springer,1996:104-113.
  • 3Kocher P.Differential power analysis.Advances in Cryptology-Crypto99,Springer LNCS,1999 ; 1666:388-397.
  • 4Boneh D,DeMillo R A.On the importance of checking cryptographic protocols for faults.Advances in Cryptology-Eurocrypt'97,Springer LNCS,1991 ; 1233:37-51.
  • 5Biham E,Shamir A.Differential fault analysis of secret key cryptosystems.Appear in Crypto'97,1997.
  • 6段晓毅,李莉,武玉华,靳济芳.最新电压毛刺(Power Glitch)攻击与防御方法研究[J].计算机科学,2011,38(B10):428-431. 被引量:5
  • 7李玮.若干分组密码算法的故障攻击研究.上海:上海交通大学.2009.
  • 8Ziade H,Ayoubi R,Velazco R.A survey on fault injection techniques.The International Arab Journal of Information Technology,2004;11(2):171-186.
  • 9Skorobogatov S.Semi-invasive attacks-a new approach to hardware security analysis.University of Cambridge,Computer Laboratory,2005.
  • 10Johnston A H.C generation and collection in p-n junctions excited with pulsed infrared laser.IEEE Trans Nuc Sci,1993;NS-40 (6):1694-1702.

二级参考文献25

  • 1Boneh D, DeMillo R, Lipton R.On the importance of checkingcryptographic protocols for faults[C]//Lecture Notes in Computer Science: Proceedings of EUROCRYPT' 97,1997: 37-51.
  • 2Biham E, Shamir A.Differential fault analysis of secret key cryp- tosystem[C]//Kaliski Jr B S.LNCS 1294:CRYPTO 1997.Heidel- berg: Springer, 1997: 513-525.
  • 3Dusart P, Letourneux G, Vivolo O.Differential fault analysis on A.E.S[C]//Zhou J, Yung M, Han Y.LNCS 2846 : ACNS 2003.Hei- delberg: Springer, 2003 : 293 -306.
  • 4Giraud C.DFA on AES[C]//Dobbertin H, Rijmen V, Sowa A. LNCS 3373:AES 2005.Heidelberg:Springer,2005:27-41.
  • 5Kim C H, Quisquater J J.New differential fault analysis on AES key schedule: Two faults are enough[C]//Grimand G, Stan- daert F X.LNCS 5189: CARDIS 2008.Heidelberg: Springer, 2008:48-60.
  • 6Clavier C, Gierlichs B, Verbauwhede I.Fault analysis study of IDEA[C]//Malkin T G.LNCS 4964: CT-RSA 2008.Heidelberg: Springer, 2008: 274-287.
  • 7Rivain M.Differential fault analysis on DES middle rounds[C]// CHES 2009,2009:457-469.
  • 8National Institute of Standards and Technology.FIPS PUB 46-3 Data Encryption Standard(DES)[S].1999-10-25.
  • 9Biham E, Shamir A.Differential cryptanalysis of DES-like crypto- systems[J].Joumal of Cryptology, 1991,4( 1 ) : 3-72.
  • 10Koeher P C. Timing Attacks on Implementations of Diffie-Hellman,RSA, DSS, and Other Systems[C]//Koblitz N, ed. Advances in Cryptology-CRYPTO ' 96, 16th Annual International Cfyptology Conference. Santa Barbara, California, USA, August 1996 : 18-22.

共引文献6

同被引文献15

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部