期刊文献+

差分能量攻击所需样本数量研究 被引量:1

Research on Sample Amounts Needed by Differential Power Attack
下载PDF
导出
摘要 对分组密码算法差分能量攻击的样本数量选取问题进行研究。通过建立差分能量信号的信噪比模型,推导出样本数量的数学表达式为N>(8σ2+ε2(αn+n-d))/d2ε2,根据σ和ε计算得到攻击所需样本数量为8000。分别用5000组和8000组随机明文对高级加密标准算法进行差分能量攻击,结果证明,当样本数量为8000时可以得到正确密钥,效果结果优于5000组明文的情况。 Aiming at the problem of sample amount to differential power attack of block cipher,by establishing the SNR model of differential power signal,this paper proposes the expression of the sample amount: N(8σ2+ε2(αn+n-d))/d2ε2.After measuring the parameters σ and ε,the numerical value is got,which is about 8 000.Using the 5 000 samples and 8 000 samples separately to finish the Differential Power Attack(DPA) to Advanced Encryption Standard(AES),and gets the right key when the samples’ amount is 8 000.The result is better than when it is 5 000,so the expression proposed is reasonable.
出处 《计算机工程》 CAS CSCD 2012年第24期128-132,共5页 Computer Engineering
关键词 分组密码算法 高级加密标准 差分能量攻击 样本数量 block cipher algorithm Advanced Encryption Standard(AES) Differential PowerAttack(DPA) sample amount
  • 相关文献

参考文献10

  • 1Kocher P, Jaffe J, Jun B. Introduction to Differential Power Analysis and Related Attacks[EB/OL]. [2011-01-22]. http://www. -cryptography.com/dpa/technical. 1998. 被引量:1
  • 2Kocher P, Jaffe J, Jun B. Differential Power Analysis[C]//Proc. of CRYPTO'99. [S. 1.]: Springer-Verlag, 1999: 388-397. 被引量:1
  • 3Mangard S. A Simple Power Analysis(SPA) Attack on Implementa- tions of the AES Key Expansion[C]//Proc. of the 5th International Conference on Information" Security and Cryptology. [S. 1.]: Springer, 2003. 被引量:1
  • 4Messerges T. Using Second-order Power Analysis to Attack DPA Resistant Software[C]//Proc. of Workshop on Cryptographic Hardware and Embedded Systems. [S. 1.]: Springer-Verlag, 2000. 被引量:1
  • 5张鹏,邓高明,邹程,赵强.差分功率分析攻击中的信号处理与分析[J].微电子学与计算机,2009,26(11):1-4. 被引量:8
  • 6Sasaki A, Abe K. Algorithm-level Evaluation of DPA Resistance to Cryptosystems[J]. Electrical Engineering in Japan, 2008, 165(3): 1221-1228. 被引量:1
  • 7Messerges T S, Dabbish E A_, Sloan R H. Examining Smart-card Security Under the Threat of Power Analysis Attacks[J]. IEEE Transactions on Computers, 2002, 51 (5): 541-552. 被引量:1
  • 8刘政林,韩煜,邹雪城,陈毅成.AES能量攻击的建模与分析[J].计算机工程与科学,2008,30(3):17-20. 被引量:5
  • 9韩煜,邹雪城,刘政林,陈毅成.AES硬件实现的能量分析攻击仿真[J].微电子学与计算机,2007,24(12):47-49. 被引量:2
  • 10Data Encryption Standard[EB/OL]. [2011-01-10]. http://en. wikipedia.org/wiki/Data Encryption_Standard. 被引量:1

二级参考文献22

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:16
  • 2黄小苑,戴紫彬.基于FPGA的AES算法芯片设计实现[J].微电子学与计算机,2005,22(8):62-64. 被引量:5
  • 3石伟,戴葵,童元满,龚锐.防DPA攻击的标准单元库的设计与实现[J].微电子学与计算机,2007,24(2):51-54. 被引量:4
  • 4Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [ J ]. Lecture Notes in Computer Science, 1999(1666) :388-397. 被引量:1
  • 5Eric Brier, Christophe Clavier, Francis Olivier. Corrdation power analysis with a leakage model [C]//Cryptographic Hardware and Embedded Systems - CHES 2004. Berlin: Springer, LNCS 3156, 2004:16-29. 被引量:1
  • 6Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 10 11]. http://www, impan, gov. pl/BC/Program/conferences/07Crypt - ahs/Aumonier% 20 - % 20SubmissionWorkshopSA. pdf. 被引量:1
  • 7Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks - revealing the secrets of smart cards [M]. USA:Springer, 2007:61-65. 被引量:1
  • 8Joan Daemen, Vincent Rijmen. The design of rijndael: AES- the advanced encryption standard [ M ]. Berlin: Springer- Verlag, 2002. 被引量:1
  • 9Kocher P, Jaffe J, Jun B. Differential power analysis, in Advances in Cryptology-CRYPTO 99 [C]. Heidelberg, Germany: Springer-Verlag, 1999:398-412 被引量:1
  • 10Ors S B, Gurkaynak F, Oswald E, et al. Power-analysis attack on an ASIC AES implementation [A]. In the proceedings of ITCC 2004[C]. Las Vegas, 2004:5-7 被引量:1

共引文献12

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部