期刊文献+

真实硬件环境下针对椭圆曲线密码体制的简单功耗分析攻击 被引量:1

SPA Attack on ECC Implemented on MCU
下载PDF
导出
摘要 介绍了一种椭圆曲线密码体制的实现算法,并分析了针对此算法进行简单功耗分析攻击的可行性,在此基础上设计实现了功耗分析平台,利用该平台获取椭圆曲线密码算法的功耗轨迹图,通过对该功耗信号的分析和处理,利用简单功耗分析的方法成功提取了椭圆曲线密码体制的私钥信息。结果验证了简单功耗分析对于椭圆曲线密码系统进行攻击的可行性和有效性。 An efficient Elliptic Curve Cryptography(ECC) algorithm was briefly introduced.The possibility of Simple Power Analysis(SPA) attacking on ECC was approved and the power analysis system was presented.By acquiring ECC algorithm power trace diagram,the power consumption of algorithm could be analyzed;further the secret key information submerged in could be extracted successfully.Experimental results show that attacking ECC algorithms without some extra protective measures SPA is feasible and operative.
出处 《成都信息工程学院学报》 2011年第1期1-4,共4页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 电子信息产业发展基金资助项目(财建[2006])824号 信部运[2006]717号) 成都市"十一五"重大科技专项项目(09GGZD988GX-033)
关键词 密码分析 边信道攻击 椭圆曲线密码体制 简单功耗分析 cryptography side channel attacks ECC simple power analysis
  • 相关文献

参考文献7

二级参考文献42

共引文献31

同被引文献15

  • 1汪朝晖,陈建华,涂航,李莉.素域上椭圆曲线密码的高效实现[J].武汉大学学报(理学版),2004,50(3):335-338. 被引量:13
  • 2N Koblitz.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48:203-209. 被引量:1
  • 3Victor S.Use of Elliptic Curves in Cryptography[C].Proceedings of Crypto 85,LNCS 218,Spring,1986:417-426. 被引量:1
  • 4Paul C Kocher.Timing attacks on implementation of Diffie-Hellman,RSA,DSS,and Other Systems[C].Advances in Cryptology:Proceeding of CRYPTO' 96,SpringerVerlag,1996:104-113. 被引量:1
  • 5Paul Kocher,Joshua Jaffe,Benjamin Jun.Differential Power Analysis[C].Lecture Notes In Computer Science; Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology,1999:388-397. 被引量:1
  • 6P Kocher.Timing attacks on implementations of Diffie-Hellman,RSA.DSS and other systems[C].In Advances in Cryptology,CRYPTO'96.Springer LNCS 1109,1996:104-113. 被引量:1
  • 7Kulrd,Scard Consortium.Side channel attacks[R/OL].scard scard-kulrd-D4.1.http://www.scard-project.org. 被引量:1
  • 8McEvoy R.Differential power analysis of HMAC based on SHA-2,and counter-measures[C]//LNCS 4867:WISA 2007.Berlin:Springer,2007:317-322. 被引量:1
  • 9陈廷定,李慧云,邬可可.抗侧信道攻击的椭圆曲线密码系统实现方法[P].中国发明专利:H04L 9/30,2009-05-06. 被引量:1
  • 10Darrel HanKerson,Julio Lòpez Hemandez,Alfred Menezes.Software Implementation of Elliptic Curve Cryptography Over Binary Fields[C].Cryptographic Hardware and Embedded Systemns-CHES 2000,LNCS,Springer-Verlag,2000,1965:1-24. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部