期刊文献+

针对IDEA加密算法的差分功耗攻击 被引量:1

Differential power analysis attack on IDEA
下载PDF
导出
摘要 研究分析国际数据加密算法IDEA的特点,采用差分功耗分析攻击方式进行密钥破解,针对IDEA算法提出一种基于汉明距离的差分功耗攻击方法。该攻击方法是一种典型的加密芯片旁路攻击方式,其理论基础为集成电路中门电路在实现加密算法时的物理特性、功耗模型及数据功耗相关性。详细介绍了针对IDEA加密系统进行差分功耗攻击的设计与实现,开发了相应的仿真实验平台,实验成功破解了IDEA加密算法的密钥,从而给IDEA加密算法研究者提供了有益的安全设计参考。实验表明,未加防护措施的IDEA加密系统难以抵御差分功耗的攻击。 By analyzing the features of International Data Encryption Algorithm(IDEA),this paper presents a Differential Power Analysis(DPA)attacking method on IDEA code system,which is based on Hamming distance.The method is one particularly powerful type of Side Channel Attacks(SCA).All its theories are based upon the physical characters,power consumption models and data dependent power consumption of CMOS logic gates which form the Integrated Circuits(ICs).The paper introduces the design and realization of DPA attacks of IDEA.Correct secret key of encryption algorithm is cracked successfully with experiments.It comes gradually and closely into ultimate target of the attack.The result indicates that IDEA encrypted system without some extra protective measures can’t resist the attacks of DPA,because of the leakages from the physical signals and the difference of power consumption while processing the different data of ICs.The results can provide the researchers a useful reference for the safety design.
出处 《计算机工程与应用》 CSCD 2012年第29期64-66,108,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60903203)
关键词 国际数据加密算法(IDEA) 差分功耗攻击 汉明距离 功耗模型 旁路攻击 Intemational Data Encryption Algorithmtance power consumption model side channel attacks(IDEA) differential power analysis attacks Hamming dis-
  • 相关文献

参考文献7

二级参考文献25

  • 1Lai X J, Massey J L, Murphy S. Markov ciphers and differential cryptanalysis /! Davis D W. EUROCRYPT 1991: LNCS 547. Berlin: Springer-Verlag, 1992: 17- 38. 被引量:1
  • 2Hawkes P, O'Connor L. On applying linear cryptanalysis to IDEA // Kim K, Matsumoto T. ASIACRYPT 1996: LNCS 1163. Berlin: Springer- Verlag, 1996:105-115. 被引量:1
  • 3Biham E, Biryukov A, Shamir A. Miss in the middle attacks on IDEA and Khufu// Knudsen L R. FSE 1999 : LNCS 1636. Berlin: Springer-Verlag, 1999:124-135. 被引量:1
  • 4Demirci H. Square-like attacks on reduced rounds of IDEA// Nyberg K, Keys H. SAC 2002: LNCS 2595. Berlin: Springer-Verlag, 2003 : 147-159. 被引量:1
  • 5Demirci H, Selcuk A A, Ture E. A new meet-in-the- middle attack on the IDEA block cipher //Matsui M, Zuccherato R J. SAC 2003: LNCS 3006. Berlin: Springer-Verlag, 2004 : 117-129. 被引量:1
  • 6Nakahara Jr J, Preneel B, Vandewalle J. The Biryukov- Demirci attack on reduced-round versions of IDEA and MESH ciphers /.Wang H, Pieprzy K J, Varadharajan V. ACISP 2004: LNCS 3108. Berlin: Springer-Verlag, 2004 : 98-109. 被引量:1
  • 7Junod P. New attacks against reduced-round versions of IDEA // Gilbert H, Handschuh H. FSE 2005: LNCS 3557. Berlin: Springer-Verlag, 2005 : 384-397. 被引量:1
  • 8Ayaz E S, Selcuk A A. Improved DST cryptanalysis of IDEA // Biham E, Youssef A M. SAC 2006: LNCS 4356. Berlin: Springer-Verlag, 2007 : 1-14. 被引量:1
  • 9Biham E, Dunkelman O, Keller N. New cryptanalytic results on IDEA // Lai X J, Chen K F. ASIACRYPT 2006: LNCS 4284. Berlin: Springer-Verlag, 2006: 412-427. 被引量:1
  • 10Biham E, Dunkelman O, Keller N. A new attack on 6- round IDEA // Biryukov A. FSE 2007: LNCS 4593, Berlin: Springer-Verlag. LNCS 4593, 2007 : 211-224. 被引量:1

共引文献3

同被引文献14

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部