期刊文献+

智能卡芯片的差分能量分析攻击研究 被引量:2

Differential Power Analysis Attacks on Smart Card
下载PDF
导出
摘要 本文主要研究智能卡芯片中DES算法的差分能量分析攻击。首先,在分析研究能量分析攻击的原理和常用攻击方法的基础上,采用基于S盒的功耗区分函数,以一种与以往文献中不同的攻击方法来对智能卡中DES算法进行了密钥破解;然后,基于Inspector SCA平台实现了这一攻击过程,成功获取了完整密钥。 This paper studied the differential power analysis attacks on smart card with DES algorithm.Firstly,we took the power distinguish function base on the S-box and decoded the DES algorithm on smartcard with a different way from previous literature which depended on the principle and common methods of power analysis attacks. Then we made use of the Inspector SCA platform to implement this attack,and achieved the complete key.
出处 《北京电子科技学院学报》 2016年第4期1-8,共8页 Journal of Beijing Electronic Science And Technology Institute
基金 中央高校基本科研业务费专项资金支持 项目编号2015CL-DF
关键词 智能卡 差分能量分析攻击 DES加密 功耗区分函数 smart card differential power analysis attacks DES encryption power distinguish function
  • 相关文献

参考文献1

二级参考文献10

  • 1陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis.In:Wiener M,ed.Advances in Cryptology:Proceedings of CRYPTO'99[C].Santa Barbara,CA,USA,Springer-Verlag,1999.388-397
  • 3Messerges T S,Dabbish E A,Sloan R H.Examining SmartCard Security under the Threat of Power Analysis Attacks.IEEE Transactions on Computers,2002,5:541-552
  • 4den Boer B,Lemke K,Wicke G.A DPA attack against the modular reduction within a CRT implementation of RSA.In:Kaliski B S,Koc C K,Paar C,eds.Cryptographic Hardware and Embedded Systems-CHES 2002,Lectures Notes in Computer Science (LNCS)[C],Springer-Verlag,2002
  • 5Akkar M L,Bevan R,Dischamp P,et al.Power analysis,what is now possible.In:Okamoto T,ed.Lectures Notes in Computer Science (LNCS),Springer-Verlag,2000
  • 6Joye M,Paillier P,Schoenmakers B.On Second-order Differential Power Analysis.In:Rao B S J R,ed.Cryptographic Hardware and Embedded Systems-CHES 2005[C],Edinburgh,UK:Springer-Verlag,2005.293-308
  • 7Chari S,Rao J R,Rohatgi P.Template attacks.In:Kaliski B S,Koc C K,Paar C.eds.Cryptographic Hardware and Embedded Systems-CHES 2002,Lectures Notes in Computer Science (LNCS)[C],Springer-Verlag,2002
  • 8NSA tempest series.http://cryptome.org/#NSA--TS
  • 9Canovas C,Clédière J.What do S-boxes Say in Differential Side Channel Attacks? http://cecile.canovas@cea.fr.2004
  • 10Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3):Data Encryption Standard

共引文献4

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部