期刊文献+

针对FPGA密码芯片M-DPA攻击的研究与实现 被引量:2

Research and Implementation of M-DPA Against Chips Based on FPGA
下载PDF
导出
摘要 分析了DPA、B-DPA和M-DPA等三种差分功耗分析方法的原理;在FPGA内部采用并行设计与流水线设计方法实现了AES的密码电路,分别采用DPA、B-DPA和M-DPA三种方法对AES的FPGA电路实现进行了攻击;得出结论:M-DPA攻击方法能够很好地减少FPGA密码芯片的并行设计和流水线设计带来的不利影响,能够有效增大分析的信噪比,减少攻击的样本量,提高攻击的效率;M-DPA攻击方法相对于DPA和B-DPA攻击能够更加适用于FPGA密码芯片的功耗旁路分析。 This paper firstly declares the principle of the differential power analysis attack (DPA), multi--bit DPA (M--DPA), Bevan' s multi--bit DPA (B--DPA) technology. Then, we implement the AES circuit with parallel structures and pipeline structures in FPGA, and use DPA, B--DPA, M--DPA attacking the AES circuit. Thirdly, with experiment, it proves that M--DPA can lead to the success to attack the FPGA. Compare to DPA and B--DPA, M--DPA can reduce the amounts of samples and improve the signal noise ratio.
出处 《计算机测量与控制》 CSCD 北大核心 2011年第12期3121-3123,3126,共4页 Computer Measurement &Control
基金 国家自然科学基金(60940019 60571037) 军械工程学院基金(YJJXM09034)
关键词 现场可编程门阵列 旁路攻击 差分功耗分析 高级加密标准 field programmable gate array (FPGA) side channel attacks (SCAs) differential power analysis (DPA) advanced encryption standard (AES)
  • 相关文献

参考文献5

  • 1邓高明,张鹏,赵强,陈开颜.基于PCA和SVM的电磁模板分析攻击[J].计算机测量与控制,2009,17(9):1837-1839. 被引量:6
  • 2Stefan Mangard,Elisabeth Oswald Thomas Popp.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2009,11. 被引量:1
  • 3T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Investigations of Power Analysis Attacks on Smartcards [EB/OL], http: // www. usenix, org/. 1999. 被引量:1
  • 4R. Bevan and E. Knudsen. Ways to Enhance DPA [A], International Conference on Information Security and Cryptology (ICISC 2002) [C, 2003. 327-342. 被引量:1
  • 5Joan Daemen and'Vincent Rijmen. The design of Rijndael: AES-- the advanced encryption standard IS]. Springer-Verlag, 2002. 被引量:1

二级参考文献7

  • 1Kocher P. Timing attacks on implementations of Diffie-- Hellman, RSA, DSS, and other systems [A], In Neal Koblitz, editor, Ad vances in Cryptology, Proceedings Crypto' 96, LCNS [C], New York: Springer--Verlag, 1996: 104--113. 被引量:1
  • 2Chari S, Rao J R, Rohatgi P. Template Attacks [A]. Burton S. Kaliski Jr. , C etin Kaya Koc, and Christof Paar, editors, Proceedings of CHES 2002 [C], LNCS, Springer, 2003: 13--28. 被引量:1
  • 3Archambeau C, Peeters E, Standaert F --X, et al. Quisquater. Template attacks in principal subspaces [A]. In Louis Goubin and Mitsuru Matsui, editors, Cryptographic Hardware and Embedded Systems -- CHES 2006 [C], volume 4249 of LNCS, Springer, 2006: 1--14. 被引量:1
  • 4Moulay Abdelaziz EL AABID, Sylvain Guilley, Philippe Hoogvorst. Template Attacks with a Power Model 2007 [EB/OL]. http: // eprint, iacr. org/2007/443. 被引量:1
  • 5International Eleetrotechnical Commission. IEC 61967: Integrated Circuits--Measurement of Electromagnetic Emanations, 150 kHz to 1 GHz. 2003[EB/OL], http: //www. iee. ch/. 被引量:1
  • 6Serway R A. Physics for scientists and engineers [M]. Saunders Golden sunburst series. Saunders college publishing, 1996. 被引量:1
  • 7Vapnik V. The nature of statistical learning theory [M]. New York: Springer--Verlag, 1999. 被引量:1

共引文献5

同被引文献17

  • 1童元满,戴葵,陆洪毅,王志英.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16. 被引量:5
  • 2童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 3AGRAWAL D, RAO J R, ROHATGI P, et al. Templates as master keys[ J]. Cryptographie Hardware and Embedded System, 2005, 38 (12) : 53 - 56. 被引量:1
  • 4JOYE M, PAILLIER P, SCHOENMAKEBS B. On second-order differential power analysis [ C]// Proceedings of Cryptograph IC Hardware and Embedded Systems. Berlin: Springer-Verlag, 2005: 293 - 308. 被引量:1
  • 5HARDLE W. Smoothing Techniques: With implementation in S (Springer Series in Statistics) [ M]. Berlin: Springer-Verlag, 2008:296 - 306. 被引量:1
  • 6PARZEN E. On estimation of a probability density function and mode[ J]. The Annals of Mathematical Statistics, 1962, 33 (3) : 1065 - 1076. 被引量:1
  • 7King S T,Tucek J,Cozzie A. Designing and implementing malicious hardware[A].2008.1-8. 被引量:1
  • 8Kiamilev F,Hoover R. Demonstration of Hardware Trojans[A].LasVegas,2008. 被引量:1
  • 9Lang Lin,Wayne Burleson,Christof Paar. MOLES:Malicious Off-Chip Leakage Enabled by Side-Channels[A].San Jose,November,2009. 被引量:1
  • 10Wang X,Tehranipoor M,Plusquellic J. Detecting Malicious Inclusions in Secure Hardware:Challenges and Solutions[A].2008.15-19. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部