期刊文献+

密码芯片中抗差分功耗分析攻击的DES方案设计 被引量:2

Scheme Design of Resisting Differential Power Analysis Attack for DES in Cryptographic Chip
下载PDF
导出
摘要 为抵抗密码芯片中针对数据加密标准算法的功耗分析攻击,通过分析数据加密标准算法遭受功耗分析攻击的原理,并结合针对数据加密标准算法关键防御技术,给出了一种基于互补电路的中间值掩码DES方案设计。主要是利用双电路进行互补输出,以保证寄存器翻转保持功耗恒定,从而最大限度地降低功耗差异。根据算法性能分析结果表明:该方案可以抵抗差分功耗分析攻击,且实现简单,能够直接应用于密码芯片的电路设计中。 In order to resist power analysis attacks chips,a scheme design of middle value masking circuit is proposed according to the principle and aiming to the data encryption for data encryption standard standard algorithm in cryptographic algorithm based on complementary the resistance countermeasures of power analysis attacks aiming to data encryption standard algorithm. The scheme mainly carries out the complementary output by using the double ciruit in order to ensure keeping the power consumption constant of register in roll-in-over and to decrease the difference of power consumption farthest. Performance analysis results demonstrate that the scheme can resist differential power analysis attacks and make easy to be implemented, and can be applied in the circuit design of cryptographic chips directly.
作者 闫喜亮
出处 《电子器件》 CAS 北大核心 2017年第1期166-170,共5页 Chinese Journal of Electron Devices
基金 河南省基础与前沿技术研究计划项目(142300410283) 河南省软科学研究计划项目(142400410179) 河南省教育厅科学技术研究重点项目(12B520063 14B520065) 河南省高等学校青年骨干教师资助计划项目(2013GGJS-230)
关键词 密码芯片 数据加密标准算法 差分功耗分析攻击 互补电路 防御措施 cryptographic chip data encryption standard algorithm differential power analysis attack complementary circuit resistance countermeasures
  • 相关文献

参考文献5

二级参考文献28

  • 1Data Encryption Standard.Federal Information Processing Stan-dard(FIPS)Publication 46,National Bureau of Standards[S].US Department of Commerce,Washington DC,1977.
  • 2Kocher P,Jaffe J,Jun B.Differential Power Analysis[C]∥Pro-ceedings of Advances in Cryptology-CRYPTO99.Springer-Ver-lag,1999:388-397.
  • 3Alioto M,Poli M.A general model for differential power analy-sis attacks to static logic circuit s[C]∥PPISCAS 2008.Piscata-way,NJ:IEEE,2008:3346-3349.
  • 4Rabaey J M.Digital Integrated Circuits[M].Englewood Cliffs,NJ:Prentice-Hall,1996..
  • 5Yee B S. Using Secure Coprocessors [D]. Ph. D. thesis.Computer Science Technical Report CMU - CS - 94 - 149,Carnegie Mellon University. May 1994.
  • 6Young A, Yung M. The Dark Side d Black- Box Cryptography- or- should we trust Capstone?CRYPTO1996,LNCS 1009.
  • 7Messerges T, Dabbish E, Sloan R. Investigations of Power Analysis Attacks on Smart cards[ C ]. In: USENIX Workshop on Smart card Technology, pages May 1999, 151 - 161.
  • 8Messerges T. Using Second-Order Power Analysis to Attack DPA Resistant Software. Cryptographic Hardware and Embedded Systems- CHES 2000, volume 1965 of LNCS,Springer- Verlag, August 2000,238 - 251.
  • 9Vikram Pasham,Steve Trimberger,High-speed DES and triple-DES encryptor/decryptor[EB/OL],August.2001,available at:http://www.xilinx.com/bvdocs/.
  • 10EITS2003多用途EDA开发试验平台实验手册[M].浙江大学电子信息技术与系统研究所,2003.

共引文献16

同被引文献18

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部