期刊文献+

抗差分功耗分析和差分故障分析的AES算法VLSI设计与实现 被引量:3

VLSI implementation of AES algorithm against differential power attack and differential fault attack
下载PDF
导出
摘要 提出了一种抗差分功耗分析和差分故障分析的AES算法硬件设计与实现方案,该设计主要采用了数据屏蔽和二维奇偶校验方法相结合的防御措施。在保证硬件安全性的前提下,采用将128bit运算分成4次32bit运算、模块复用、优化运算次序等方法降低了硬件实现成本,同时使用3级流水线结构提高了硬件实现的速度和吞吐率。基于以上技术设计的AESIP核不仅具有抗双重旁道攻击的能力,而且拥有合理的硬件成本和运算性能。 A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. The main countermeasures employed in this hardware design are masking technique and two-dimensional parity-based concurrent error detection method. And exploits such methods as separating 128bit calculation into four 32bit calculations, module reuse and optimization of calculation order was exploited to reduce hardware cost. Moreover, a 3 level pipelined structure of AES encryption and decryption is used to improve hardware speed and throughput. The AES IP core based on these techniques can resist two kinds of side channel attacks with reasonable performance and cost.
出处 《通信学报》 EI CSCD 北大核心 2010年第1期20-29,共10页 Journal on Communications
基金 国家自然科学基金资助项目(60776028)~~
关键词 信息安全 抗攻击算法 VLSI实现 旁道攻击 先进加密标准 information security anti-attack algorithm VLSI implementation side channel attack AES
  • 相关文献

参考文献13

  • 1National institute of standards and technology. FIPS 197: advanced encryption standard[EB/OL], http://csrc.nist.gov/publications/fips/ tips 197/tips- 197.pdf, 2001. 被引量:1
  • 2KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Advances in Cryptology CRYPTO 1999[C]. Springer, Santa Barbara, California, USA, 1999. 388-397. 被引量:1
  • 3BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. Proc. CRYPTO 1997[C]. Santa Barbara, California, USA, 1997.513-525. 被引量:1
  • 4BLOEMER J, SEIFERT J. Fault based cryptanalysis of the advanced encryption standard[EB/OL], http://www.iacr.org/eprint/2002/075.pdf, 2002. 被引量:1
  • 5AKKAR M, GIRAUD C. An implementation of DES and AES, secure against some attacks[A]. Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01)[C]. Paris, France, 2001.309-318. 被引量:1
  • 6KARRI R, WU K, MISHRA P. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers[J]. IEEE Trans Computer-Aided Design of Integrated Circuits and Systems, 2002.1509-1517. 被引量:1
  • 7KARRI R, KUZNETSOV G, GOESSEL M. Parity-based concurrent error detection of subsititution-permutation network block ciphers[A]. Proc Cryptographic Hardware and Embedded Systems (CHES '03)[C] Cologne, Germany, 2003. 113-124. 被引量:1
  • 8YEN C, WU B. Simple error detection methods for hardware implementation of advanced encryption standard[J]. IEEE Transitions on Computers, 2006, 55(6): 720-731. 被引量:1
  • 9OSWALD E, MANGARD S, PRAMSTALLER N. A side-channel analysis resistant description of the AES S-box[A]. The 12^th Fast Software Encryption Workshop (FSE'05)[C]. Portugal, 2005. 413-423. 被引量:1
  • 10MANGARD S. Hardware countermeasures against DPA -a statistical analysis of their effectiveness[A]. CT-RSA 2004[C]. Springer-Verlag, San Francisco, CA, USA, 2004. 222-235. 被引量:1

同被引文献25

  • 1赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 2I Alioto M,Poli M, Rocchi S.A general power model of differ- ential power analysis attacks to static logic circuits [ J ]. W.EF. Transactiom on Very Large Scale Integration (VLSI) Systems, 2010,18(5) :711 - 724. 被引量:1
  • 3Wu K, Li H,Yu F. Relrieving lost efficiency of scalar multipli- cations for resisting against side-channel attacks [ J 1. Journal of computers,2010,5(12) : 1878 - 1884. 被引量:1
  • 4Akkar M L, Giraud C. An implementation of DES and AES, secure against some attacks[ A] . of the 3rd Internation- al Workshop on Cryptographic Hardware and Emded Systems[ C]. Paris:2001.309 - 318. 被引量:1
  • 5Golic J D, Tymen C. Multiplicative masking and power analysis of AES [ A ]. Proceed of the 4th International Workshop on Cryptographic Hardware and Embedded Systems[ C]. Cologne: 2003. 198 - 212. 被引量:1
  • 6Ors S B, Gurkaynak F, Oswald E, et al. Power analysis attack on an ASIC AES implementation[ A ]. Proceed of International Conference on Information Technology:Coding and Computing EC]. as Vegas:2004.546 - 552. 被引量:1
  • 7Oswald E,Mangard S,Pramstaller.A side channel analysis re- sistant description of the AES s-box[A]. Proceed of the 12th Annual Fast Software Eneryption Workshop [ C ]. Paris: 2005. 413 - 423. 被引量:1
  • 8Trichina E, Seta D, Gennani L. Simplified adaptive multiplica- tive masking for AES [- A ]. Proceed of the 4th International Workshop on Cryptographic Hardware and Systems [C]. Cologne:2003:187 - 197. 被引量:1
  • 9Kocher P,Jaffe J,Jun Benjamin.Differential PowerAnalysis[C]//Proc.of CRYPTO’99.[S.l.]:Springer-Verlag,1999:388-397. 被引量:1
  • 10Mangard S,Pramstaller N,Oswald E.Successfully AttackingMasked AES Hardware Implementations[C]//Proc.of Workshopon Cryptographic Hardware and Embedded Systems.[S.l.]:Springer-Verlag,2005:157-171. 被引量:1

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部