期刊文献+

ECC算法的功耗分析研究 被引量:1

Research of power-analysis to elliptic curve cryptography
下载PDF
导出
摘要 随着旁道攻击方法的提出,在安全领域,就要求各类密码算法在实际应用时需要考虑抵抗此类攻击的能力。利用Simplepower功耗分析工具,对椭圆曲线密码(ECC)加密算法在GF(2m)域上的Montgomery标量乘法进行了抵抗,简单功耗分析(SPA)和差分功耗分析(DPA)的研究。结果表明,目前常用的Montgomery算法具有较好的抵抗SPA攻击的能力,但是对DPA攻击防护不够,从而得出ECC算法的实际应用还需要额外添加抗差分功耗分析的方法,以增强其抵抗DPA攻击的能力。 After the development of side-channel attack, these implementations in security area require more considerations to counteract these types of attacks. By using power analysis tool Simplepower, analysis was made to evaluate the security level of montgomery scalar multiplication on elliptic curve cryptography (ECC) when it was attacked by simple power analysis (SPA) and differential power analysis (DPA). The results show that Montgomery algorithm can prevent SPA attack while to DPA attack, it is less secure which mean extra methods should be used to protect against DPA.
作者 赵岚
出处 《机电工程》 CAS 2007年第8期8-10,23,共4页 Journal of Mechanical & Electrical Engineering
基金 国家高技术研究发展计划(863计划)资助项目(2005AA1Z1260) 浙江省科技计划资助项目(2004C11043)
关键词 椭圆曲线密码 椭圆曲线离散对数问题 旁道攻击 差分功耗分析 简单功耗分析 elliptic curve cryptography (ECC) elliptic curve discrete logarithm problem side channel attack differential power analysis (DPA) simple power analysis (SPA)
  • 相关文献

参考文献9

  • 1KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48 (177):203-209. 被引量:1
  • 2VICTOR S M.Uses of elliptic curves in cryptography,advances in cryptology CRYPTO'85[J].Lecture Notes in Computer Science,1986,21(8):417-426. 被引量:1
  • 3YE W,VIJAYKRISHNAR N,KANDEMIR M,et al.The design and use of simplepower:A Cycle-Accurate Energy Estimation Tool[C].In:Proceedings of the IEEE DAC'00,2000:340-345. 被引量:1
  • 4CORON J.Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems[C].CHES'99,LNCS 1717,1999:292-302. 被引量:1
  • 5LOPEZ J,DABAB R.Fast Multiplication on elliptic Curves over GF (2m) without Precomputation[C].CHES'99,LNCS1666,1999:316-327. 被引量:1
  • 6KOCHER P,JAFE J,JUN B.Differential Power Analysis[C].Advances in cryptology-CRYPTO'99,LNCS1666,1999:388-397. 被引量:1
  • 7LTOL K,LZU T,TAKENAKA M.Address-bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA[C].CHES'2002,LNCS 2523,2003:129-143. 被引量:1
  • 8BURGER D,AUSTIN T.The simplescalar Tool Set,Version 2.0.Technical Report[D].Wisconsin:University of Wisconsin,1997. 被引量:1
  • 9YANG S Q,WOLF W,NARAYANAN V,et al.Power-attack Resistant Cryptosystem Design:a Dynamic Voltage and Frequency Switching approach,in Proceedings[C].DATE'05 Designers Forum,2005. 被引量:1

同被引文献23

引证文献1

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部