期刊文献+

基于数据加密标准掩码的功耗分析方法 被引量:3

Power Consumption Analysis Method Based on Data Encryption Standard Mask
下载PDF
导出
摘要 针对典型数据加密标准(DES)掩码实现的安全性问题,提出一种对其进行密钥破解的相关性功耗分析方法。结合DES运算后两轮,选择密码运算过程中间值中的分散位作为目标函数,利用汉明重量模型猜测第16轮运算的轮密钥,并计算功耗和中间值数据的汉明重量之间的相关性,根据相关性大小进行排序,从而破解掩码DES算法的密钥。实验结果表明,该方法取得了较好的效果,可成功破解掩码型DES算法的64位密钥。 Aiming at the security problem of typical masked Data Encryption Standard ( DES ) implementation, this paper introduces a Correlation Power Analysis( CPA) method,which combines the last two rounds of DES algorithm and selects discrete bits of intermediate data as target function. Using Hamming Weight(HW) model,it guesses the 16th round of DES key and calculates the correlation between power and HW of data. By ranking the correlation value,it can break the masked DES key. Experimental result of attacking smartcard with masked software DES shows that it can successfully break the 64 bit DES key.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第5期133-138,共6页 Computer Engineering
基金 国家质检公益性行业科研专项基金资助项目(201310033)
关键词 数据加密标准 旁路攻击 掩码技术 相关性功耗分析 S盒 Data Encryption Standard ( DES ) side channel attack mask technology Correlation Power Analysis(CPA) S box
  • 相关文献

参考文献14

  • 1American National Standards Institute.ANSI X3.92-1981American National Standard,Data Encryption Algorithm[S].1981.
  • 2Paul K,Joshua J,Jun B.Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Conference.Berlin,Germany:Springer,1999:388-397.
  • 3Tiri K,Verbauwhede I.Securing Encryption Algorithms Against DPA at the Logic Level:Next Generation Smart Card Technology[C]//Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems.Cologne,Germany:Springer-Verlag,2003:125-136.
  • 4Fournier J J A,Moore S,Li H Y.Security Evaluation of Asynchronous Circuits[C]//Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems.Cologne,Germany:Springer-Verlag,2003:137-151.
  • 5Guiley S,Sauvage L,Hoogvorst P,et al.Security Evaluation of WDDL and Sec Lib Countermeasures Against Power Attacks[J].IEEE Transactions on Computers,2008,57(11):1482-1497.
  • 6Trichina E,Korkishko L.Secure and Efficient AES Software Implementation for Smart Cards[C]//Proceedings of the 5th International Workshop on Information Security Applications.Jeju,Korea:SpringerVerlag,2004:425-439.
  • 7Yoshikawa M,Kojima Y.Efficient Random Number for the Masking Method Against DPA Attacks[C]//Proceedings of the 21st International Conference on Systems Engineering.Las Vegas,USA:[s.n.],2011:321-324.
  • 8Akkar M L,Giraud C.An Implementation of DES and AES,Secure Against Some Attacks[C]//Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems.Paris,France:SpringerVerlag,2001:309-318.
  • 9Akkar M L,Goubin L.A Generic Protection Against Highorder Differential Power Analysis[C]//Proceedings of the10th International Workshop on Fast Software Encryption.Lund,Sweden:[s.n.],2003:192-205.
  • 10李菁,李林森.IC卡芯片DES加密差分功耗分析方法[J].计算机工程,2013,39(7):200-204. 被引量:2

二级参考文献26

  • 1赖坤锋.智能卡SPA&DPA攻击[J].现代电子技术,2005,28(17):28-29. 被引量:3
  • 2周开民,陈开颜,赵强,褚杰,张鹏.DPA方法对加密系统的FPGA旁路攻击研究[J].军械工程学院学报,2006,18(2):51-54. 被引量:6
  • 3KOCHER P,JAFFE J,JUN B.Differential Power Analysis[A].Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology,Vol 1666 of Lecture Notes In Computer Science[C].1999, 1666:388-397.
  • 4CHANG H.A study on Securing AES against Differential Power Analysis[EB/OL]. http://caislab.icu.ac.kr/pub/down/2004/w20022122_chs.pdf,2003.
  • 5JEAN-S'EBASTIEN CORON.Resistance against Differential Power Analysis for Elliptic Curve Cryptosystem[EB/OL]. http://www.gemplus.com/smart/rd/publications/pdf/Cor99dpa.pdf,2005-05.
  • 6Using Second-Order Power Analysis to Attack Dpa Resistant Software[A]. Lecture Notes in Computer Science,Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop[C].Worcester,MA,USA,2000,1965:238.
  • 7BERT DEN BOER, KERSTIN LEMKE, GUNTRAM WICKE.A DPA Attack against the Modular Reduction within a CRT Implementation of RSA[J]. Lecture Notes in Computer Science,2003,2523:228-243.
  • 8KOCHER P, JAFFE J,JUN B.Introduction to Differential Power Analysis and Related Attacks[EB/OL]. http://www.cryptography.com/resources/whitepapers/DPATechInfo.pdf, 1998.
  • 9CHARI S, JUTLA CS,RAO JR,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards[A].Proceedings of the Second Advanced Encryption Standard(AES) Candidate Conference[C].1999.
  • 10MESSERGES TS.Securing the AES Finalists Against Power Analysis Attacks[A]. Proceedings of Fast Software Encryption Workshop 2000[C]. Springer-Verlag,2000.

共引文献9

同被引文献19

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部