期刊文献+

智能卡抗DPA攻击技术研究

Research on Smart Card Anti-DPA Attack Technology
下载PDF
导出
摘要 智能卡在使用过程中会存在信息泄漏的问题,对智能卡系统的安全建设造成很大的威胁。智能卡攻击方法主要有两大类,传统的攻击方法和侧信道攻击方法。而侧信道攻击方法中的差分能量分析攻击(DPA)成为热点。文章主要对智能卡系统的抗DPA能量分析攻击进行研究,采用隐藏技术和掩码技术方法来降低甚至消除密码设备的能量消耗依赖性,设计了掩码型AES算法提高智能卡的抗能量分析攻击能力,并对掩码型AES的二阶DPA攻击进行实验仿真,结果表明,能量迹中最高相关系数为0.242282,而平均相关度却非常低,能十分有效地保护智能卡免受DPA攻击。 There is a problem of information leakage during the use of a smart card, which poses a great threat to the security construction of the smart card system. There are two main types of smart card attack methods, traditional attack methods and side channel attack methods. The differential energy analysis attack(DPA) in the side channel attack method has become a hot spot.This paper mainly studies the smart card system’s anti-DPA energy analysis attack. It uses hiding technology and mask technology to reduce or even eliminate the energy consumption dependence of cryptographic devices. The masked AES algorithm is designed to improve the smart card’s ability to resist energy analysis attacks. The second-order DPA attack of the masked AES is simulated by experiments. The results show that the highest correlation coefficient in the energy trace is 0.242282, but the average correlation is very low, which can effectively protect the smart card from DPA attacks.
作者 张皓 刘国辉 张新全 Zhang Hao;Liu Guohui;Zhang Xinquan(Wuhan Research Institute of Posts and Telecommunications,Wuhan 430074,China)
出处 《长江信息通信》 2021年第7期10-13,共4页 Changjiang Information & Communications
关键词 智能卡 差分能量分析攻击(DPA) 隐藏技术 掩码技术 二阶DPA攻击 smart card differential energy analysis attack(DPA) hiding technology masking technology second-order DPA attack
  • 相关文献

参考文献2

二级参考文献15

  • 1Barkan E,Biham E.In how many ways can you write Rijndael? In:Proceedings of Asiacrypt′02,Queenstown,New Zealand, 2002
  • 2Cheon J H,Kim M J,Kim K et al. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton,Information Security and Cryptology-ICISC 2001,2001
  • 3Courtois N T,Pieprzyk J.Cryptanalysis of block ciphers with overdefined systems of equations.In:Proceedings of Asiacrypt′02,Queenstown,New Zealand,2002
  • 4Daemen J,Rijmen V.The Design of Rijndael.Information Security and Cryptography,Springer Verlag,2002
  • 5Ferguson N,Kelsey J,Lucks S et al. Improved cryptanalysis of Rijndael. In : Proceedings of Fast Software Encryption-FSE′00, New York, NY, USA, April, 2000
  • 6Ferguson N,Schroeppel R,Whiting D.A simple algebraic representation of Rijndael.In:Proceedings of Selected Areas in Cryptography-SAC′01 ,Toronto,Ontario, Canada, August, 2001
  • 7Gilbert H,Minier M.Acollision attack on seven rounds of Rijndael. In : Proceedings of the Third Advanced Encryption Standard Conference,New York,USA,April, 2000
  • 8Knudsen L R,Wagner D.Integral cryptanalysis(extended abstract).In:Proceedings of Fast Software Encryption-FSE ′02, Leuven, Belgium, February, 2002
  • 9Lucks S.Attacking seven rounds of Rijndael under 192-bit and 256-bit keys. In:Proceedings of the Third Advanced Encryption Standard Conference,New York, USA, April, 2000
  • 10Murphy S,Robshaw M J B.Essential algebraic structure within the AES.In:Proceedings of Crypto′02,Santa Barbara, California, USA, 2002

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部