期刊文献+

一种新型的抗DPA攻击可配置逻辑结构 被引量:3

A Novel DPA-Resistance Configurable Logic
下载PDF
导出
摘要 DPA(Differential Power Analysis)攻击的强度取决于芯片电路功耗与所处理的数据之间的相关性以及攻击者对算法电路实现细节的了解程度.本文结合动态差分逻辑和可配置逻辑的特点,提出了一种具有抗DPA攻击能力的双端输出可配置逻辑(DRCL:Dual-Rail Configurable Logic).该逻辑一方面具有与数据取值无关的信号翻转率和信号翻转时刻,因而能够实现很好的功耗恒定特性;另一方面去除了电路结构与电路功能之间的相关性,从而可以阻止攻击者通过版图逆向分析的方法窃取算法电路实现细节.实验结果表明,DRCL比典型的抗DPA攻击逻辑WDDL(Wave Dynamic Differential Logic)具有更好的功耗恒定性,因而具有更强的DPA攻击防护性能. The efficiency of Differential Power Analysis(DPA) depends on the correlation between power consumption and data value,as well as the attacker′s understanding of circuit details.To counteract DPA attack,this paper presents a novel logic,Dual-Rail Configurable Logic(DRCL),which combines the characteristics of dynamic differential logic and configurable logic.The DRCL has constant power consumption which is independent of the data value.At the same time,the uniform structure of DRCL prevents attackers from revealing circuit details by layout reverse analysis.The experimental results show that the proposed logic DRCL has better power constant than the typical DPA resistant logic WDDL.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第2期453-457,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60970036) 国家863高技术研究发展计划(No.2009AA01Z124)
关键词 安全芯片 旁路攻击 功耗分析攻击 动态差分逻辑 可配置逻辑 security chip side channel attack differential power analysis dynamic differential logic configurable logic
  • 相关文献

参考文献17

  • 1高娜娜,李占才,王沁.一种可重构体系结构用于高速实现DES、3DES和AES[J].电子学报,2006,34(8):1386-1390. 被引量:19
  • 2王沁,梁静,齐悦.一种有效缩减AES算法S盒面积的组合逻辑优化设计[J].电子学报,2010,38(4):939-942. 被引量:6
  • 3P. Kocher, J. Jaffe, B. Jun. Differential power analysis[ A]. Ad vances in Cryptology-CRYPTO' 99: 19th Annual International Cryptology Conference [ C ]. Santa Barbara, CA, USA: Springer-Verlag, 1999.388 - 397. 被引量:1
  • 4陈开颜,张鹏,邓高明,赵强.物理可观测下DES的安全性研究[J].电子学报,2009,37(11):2389-2395. 被引量:7
  • 5F-X Standaert,S B Ors,B Preneel Power analysis of an FPGA implementation of Rijindael: Is pipelining a DPA countermea sure? [ A]. Cryptographic Hardware Embedded System-CHES 20041[ C]. Boston: SpfingerVerlag, 2004.30 - 44. 被引量:1
  • 6S Mangard, N Pramstaller, E Oswald. Successfully attacking masked AES hardware implementations [ A ]. Cryptographic Hardware Embedded System-CHES 2005[ C]. Edinburgh, UK: Springer-Verlag, 2005. 157 - 171. 被引量:1
  • 70 Kommerling,M G Kuhn. Design principles for tamper-resis- tant smartcard processor [A ]. The USENIX Workshop on Smartcard Technology Smartcard 1999 [ C ]. Chicago: USENIX Association, 1999.9 - 20. 被引量:1
  • 8K Tiff, M Akmal, I Verbauwhede. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards[A]. Euro pean Solid-State Circuit Conference-ESSCIRC 2002[ C]. Firenze, Italy: University of Bologna, 2002.403 - 406. 被引量:1
  • 9K Tiri, I Verbauwhede. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[ A ]. De sign, Automation, and Test in Europe Conference-DATE 21304 [ C] .Paris,France: IEEE Computer Society,2004.246- 251. 被引量:1
  • 10K Tiff, I Verbauwhede. Place and route for secure standard cell design [ A ]. 6th International Conference on Smart Card Research and Advanced Applications-CARDIS 2004[ C ]. Toulouse,France: Springer-Verlag, 2004. 143 - 158. 被引量:1

二级参考文献36

  • 1高娜娜,李占才,王沁.一种可重构体系结构用于高速实现DES、3DES和AES[J].电子学报,2006,34(8):1386-1390. 被引量:19
  • 2李翔宇,孙义和.采用数据流模式提高乱序执行密码芯片的安全性[J].电子学报,2007,35(2):202-206. 被引量:2
  • 3M L Akkar, C Girand. An implementation of DES and AES secure against some attacks[A]. Cryptographic Hardware Embedded System-CHES 2001 [C]. Paris: Springer-Verlag, 2001. 309 - 318. 被引量:1
  • 4J A Fournier, S Moore,H Li,R D MuUins,G. S Taylor. Security evaluation of asynchronous circuits[ A]. Cryptographic Hard- ware Embedded System-CHES 2003[ C]. Cologne: Springer- Verlag,2003. 137 - 151. 被引量:1
  • 5S Mangard. Hardware countermeasures against DPA-a statistical analysis of their effectiveness [ A ]. CT-RSA 2004 [ C ]. San Francisco: Springer-Verlag, 2004. 222 - 235. 被引量:1
  • 6G Yeap. Practical Low Power Digital VLSI Design[M]. USA: Kluwer Academic Publishers, 1998. 被引量:1
  • 7E Brier, C Clavier, F Olivier. Correlation power analysis with a leakage model [ A ]. Cryptographic Hardware Embedded System-CHES 2004[ C]. Boston: Springer-Verlag, 2004.16 - 29. 被引量:1
  • 8Federal Information Processing Standards Publication 46- 3 (FIPS PUB 46 - 3) : Data Encryption Standard[S]. 被引量:1
  • 9T S Messerges,E A Dabbish,R H Sloan. Examining smartcard security under the threat of power analysis attacks [J]. IEEE Transactions on Computers,2002,51 (5):541 -552. 被引量:1
  • 10S Micali, L Reyzin. Physically observable cryptography (extended abstract) [A]. 1st Theory of Cryptography Conference [C]. Cambridge, MA: Springer-Verlag, 2004.278 - 296. 被引量:1

共引文献28

同被引文献39

  • 1李翔宇,孙义和.采用数据流模式提高乱序执行密码芯片的安全性[J].电子学报,2007,35(2):202-206. 被引量:2
  • 2Juels A,Weis S A.Authenticating pervasive devices with human protocols[A].2005 25th Annual International Cryptology Conference Proceedings[C].Berlin:Springer,2005.293-308. 被引量:1
  • 3Bogdanov A,Knudsen L R,Leander G,et al.PRESENT:An ultra-lightweight block cipher[A].2007 9th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2007.450-466. 被引量:1
  • 4Shibutani K,Isobe T,Hiwatari H,et al.Piccolo:an ultralightweight blockcipher[A].2011 13th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2011.342-357. 被引量:1
  • 5Guo J,Peyrin T,Poschmann A,et al.The LED block cipher[A].2011 13th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2011.326-341. 被引量:1
  • 6Kocher P,Jaffe J,Jun B.Differential power analysis[A].1999 19th Annual International Cryptology Conference Proceedings[C].Berlin:Springer,1999.388-397. 被引量:1
  • 7Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[A].Joye M.2004 6th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2004.16-29. 被引量:1
  • 8Breier J,Kleja M.On practical results of the differential power analysis[J].Journal of Electrical Engineering,2012,63 (2):125-129. 被引量:1
  • 9Canright D,Batina L.A very compact "perfectly masked" Sbox for AES[A].2008 6th International Conference on Applied Cryptography and Network Security Proceedings[C].Berlin:Springer,2008.446-459. 被引量:1
  • 10Coron J S.A new DPA countermeasure based on permutation tables[A].Ostrovsky R.2008 6th International Conference on Security and Cryptography for Networks Proceedings[C].Berlin:Springer,2008.278-292. 被引量:1

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部