期刊文献+

A Combinational Power Analysis Method against Cryptographic Hardware

A Combinational Power Analysis Method against Cryptographic Hardware
下载PDF
导出
摘要 Power analysis is a non-invasive attack against cryptographic hardware,which effectively exploits runtime power consumption characteristics of circuits.This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit.The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well.The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption.Experimental results show that,compared to CPA(Correlation Power Analysis)method,our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces. Power analysis is a non-invaslve attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit. The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well. The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption. Experimental results show that, compared to CPA(Correlation Power Analysis) method, our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.
出处 《China Communications》 SCIE CSCD 2015年第1期99-107,共9页 中国通信(英文版)
基金 supported by Major State Basic Research Development Program(No. 2013CB338004) National Natural Science Foundation of China(No.61402286, 61202372,61202371,61309021) National Science and Technology Major Project of the Ministry of Science and Technology of China (No.2014ZX01032401-001)
关键词 加密硬件 电源分析 组合逻辑电路 距离模型 功率分析 功耗特性 时序逻辑电路 信息泄露 cryptographic hardware side channel attack power analysis combinational logic
  • 相关文献

参考文献2

二级参考文献19

  • 1ECRYPT. The Side Channel Cryptanalysis Lounge[ EB/OL]. [2010 -04 -15]. http://www.crypto. ruhr-uni-bochum, de/en_sclounge. html.
  • 2KOCHER P, JAFFE J, JUN B. Differential power analysis[C]// CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999: 388-397.
  • 3BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [ C]//CHES 2004, LNCS 3156. Berlin: Springer-Verlag, 2004:16 - 29.
  • 4CORON J-S. Resistance against differential power analysis for elliptic curve cryptosystems[ C]// CHES 1999, LNCS 1717. Berlin: Springer-Verlag, 1999:292 - 302.
  • 5BIHAM E, SHAMIR A. Power analysis of the key scheduling of the AES candidates [C]//Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference. [ S. l. ] : Addison-Wesley, 1999:115 - 121.
  • 6NOVAK R. SPA-based adaptive chosen-ciphertext attack on RSA implementation[C]// PKC 2002, LNCS 2274. Berlin: Springer- Verlag, 2002:252-262.
  • 7SCHINDLER W. A timing attack against RSA with the Chinese remainder theorem[C]// CHES 2000, LNCS 1965. Berlin: Springer- Verlag, 2000:109 - 124.
  • 8CANNIlY, RE C , DUNKELMAN O , KNEZEVICM . KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers[C]// CHES 2009, LNCS 5747. Berlin: Springer-Verlag, 2009:272-288.
  • 9MANGARD S, OSWALD E, POPP T. Power analysis attacks: Revealing the secrets of smart cards [M]. Berlin: Springer-Verlag, 2007.
  • 10KOCHER P,JAFFE J,JUN B.Differential Power Analysis[C] //CRYPTO '99.[s.1.] :Springer-Verlag,1999:388-397.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部