期刊文献+

针对DES密码芯片的CPA攻击仿真 被引量:6

Simulation of correlation power analysis against DES cryptographic chip
下载PDF
导出
摘要 为研究密码芯片抗功耗分析性能,构造了一个功耗分析研究平台,结合DES算法在平台上进行了相关性功耗分析(CPA)攻击仿真实验。根据猜测部分密钥时的模拟功耗与猜测整个密钥时模拟功耗之间的相关系数大小来确定猜测密钥的正确性,由此可以确定整个密钥。这种功耗分析仿真方法,能够揭示未经防御的DES算法面临CPA攻击时的脆弱性。 To study the ability of cryptographic chip's resistance to power analysis, this paper constructs a platform for power analysis. Combined DES algorithm, we do the correlation power analysis attack experiment based on this platform. With comparing the correlation coefficient between the power consumption of guessed partial key and the whole key, the correctness of the guessed partial key is confirmed by this method, the rest part of key can be achieved by this method. This method reveals the vulnerability of DES implementation without any countermeasure to CPA attacks.
出处 《电子技术应用》 北大核心 2009年第7期149-152,共4页 Application of Electronic Technique
关键词 相关性功耗分析 仿真 DES correlation power analysis simulation DES
  • 相关文献

参考文献5

二级参考文献17

  • 1P.Kocher,J.Jaffe, B.Jun.Intreduetion to Differential Power Analysis and Related Attaeks.1998.http://www.eryptography.com . 被引量:1
  • 2Xi Xi Chen. Differential Power Analysis Countermeasures for DES. 2002. 被引量:1
  • 3Thomas S. Messerges, Ezzat A. Dabbish, Robert H.Sloan. Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE TRANSACTIONS ON COMPUTERS, 2002;51(5). 被引量:1
  • 4Jean.Sebastien Coron ,Louis Goubin.On Boolean and Arithmetic Masking against Differential Power Analysis.CHES2000,vol. 1965 of Lecture Notes in Computer Science. 被引量:1
  • 5Luca Benini,Alberto Macii,Enrico Macii,Elvira,etc.EnergyAware Design Techniques for Differential Power Analysis Protection. Anaheim, California, USA DAC 2003, June. 被引量:1
  • 6Jean-Sebastien Coron. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems.Cryptographic Hardware and Embedded System,vol. 1717 of Lecture Notes in Computer Science, 1999. 被引量:1
  • 7[韩]Hwasun Chang. A Study on Securing AES against Differential Power Analysis. School of Engineering Information and Communications University, A Thesis for the Degree of Master,2004. 被引量:1
  • 8ANSI X9.32-American National Standard for Data Encryption Algorithm (DEA). AM. Standards Inst, 1981 被引量:1
  • 9Kocher P,Jaffe J,Jun B. Introduction to differential power analysis and related attacks. http:∥www. cryptography. com/dpa/technical 被引量:1
  • 10Kocher P,Jaffe J,Jun B. Differential power analysis. Proceeding of Advances in cryptography(CRYPTO'99), 1999: 388 被引量:1

共引文献16

同被引文献82

  • 1赵耿,方锦清.基于Feistel结构的混沌密码编码算法[J].北京电子科技学院学报,2003,11(1):13-21. 被引量:2
  • 2陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 3MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55. 被引量:8
  • 4Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109. 被引量:6
  • 5Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential Power Analysis[C]. Lecture Notes In Computer Sci- ence; Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, 1999,1666:388 - 397. 被引量:1
  • 6NBS, Data Encryption Standard. FIPS PUB46 [EB/OL]. National Bureau of Standards. WashingtonD, C., 1977. 被引量:1
  • 7Eric Brier,Christophe Clavier,Francis Olivier. Correlation Power Analysis with a Leakage Model[C]. CHES 2004, LNCS 3156,2004 : 16 - 29. 被引量:1
  • 8Manfred Aigner, Elisabeth Oswald. Power Analysis Tutorial [D]. Institute for Applied Information Processing and Communication University of Technology Graz Inffeldgasse 16a, A-8010 Graz, Austria, 1999. 被引量:1
  • 9Fran, cois-Xavier Standaertl. Power Analysis Attacks Against FPGA Implementations of the DES[J]. J Beck- er, M Platzner, S Vernalde (Eds.): FPL 2004, LNCS 3203,2004,84-94. 被引量:1
  • 10Weibo Pan, William P, Marnane A. Correlation Power Analysis Attack against Tate Pairing on FPGA[J ]. A Koch(Eds. ) :ARC 2011, LNCS 6578,2011,340 - 349. 被引量:1

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部