期刊文献+

针对密码算法的高阶DPA攻击方法研究 被引量:4

Investigation of high order DPA against cryptographic algorithm
下载PDF
导出
摘要 差分能量分析(DPA)是一种强大的密码算法攻击技术。一种有效的防御措施是对参与运算的中间数据进行掩码,然而采用掩码技术的密码算法仍然可以用高阶DPA进行攻击。高阶DPA攻击与一般DPA攻击相比较存在很多难点,包括建立正确的攻击模型、选取正确的攻击点、构造适当的组合函数以及提高攻击模型的信噪比等。通过对一种经典的掩码方案进行分析,逐一阐述在高阶DPA攻击中如何解决上述难点,并在硬件实现的算法协处理器上对攻击方法进行了验证。 Differential power analysis is a powerful attack against cryptographic algorithms.An effective protection method is to mask the intermediate data during calculation.However,cryptographic algorithms with masking technology are still susceptible to high order DPA.Compared with normal DPA,there are more difficulties to be solved in high order DPA such as correct attack modeling,right choices of attack points,right construction of composition function and ways of improving s/n rate,etc.In this paper,by analyzing a classic masking scheme,we will demonstrate how to solve the difficulties mentioned above during a high order DPA attack,and then verify it on a hardware-implemented cryptographic coprocessor.
作者 赵东艳 何军
出处 《电子技术应用》 北大核心 2013年第10期56-58,61,共4页 Application of Electronic Technique
关键词 高阶DPA攻击 差分能量分析 侧信道分析 high order DPA differential power analysis side channel analysis
  • 相关文献

参考文献6

  • 1KOCHER P,JAFFE J, JUN B.Introduction to differential power analysis and related attacks[A].Cryptography Research Inc., 1998. 被引量:1
  • 2KOCHER P,JAE J,JUN B.Differential power analysis[C]. In Proceedings of CRYPTO'99,Springer-Verlag, 1999. 被引量:1
  • 3MESSERGES T S,DABBISH E A,SLOAN R H,Investiga- tions of power analysis attacks on smartcards[C].In Pro- ceedings of the USENIX Workshop on Smartcard Technolo- gy, Chicago, 1999. 被引量:1
  • 4AKKAR M L,GIRAUD C.An implementation of DES and AES secure against some attacks[C].In Proceedings of CHES2001, Springer-Verlag, 2001. 被引量:1
  • 5BRIER E, CLAVIER C, OLIVIER F.Correlation power analysis with a leakage model[C].In Cryptographic Hardware and Embedded Systems-CHES 2004, Springer-Verlag, 2004. 被引量:1
  • 6MESSERGES T S.Using second-order power analysis to attack DPA resistant software[C].In Proceedings of CHES' 2000, Springer-Verlag, 2000. 被引量:1

同被引文献27

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006. 被引量:8
  • 2梅振宇,张虹.基于非S盒变换的DES分组密码的改进[J].计算机工程与设计,2007,28(17):4119-4121. 被引量:5
  • 3李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010. 被引量:6
  • 4Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Confer-ence on Advances in Cryptology, 1999. 被引量:1
  • 5KOCHER P C. Timing attacks on implementations of diflfie-hellman, RSA, DSS, and other sys-tems[C]//Berlin: Springer, 1996. 被引量:1
  • 6李浪,李仁发,李静.一种SM4加密算法差分能量攻击[J].北京电子科技学院学报,2008,37(7):39-41. 被引量:2
  • 7Kim T, Kim J, Hong S, et al. Linear and Dif-ferential Cryptanalysis of Reduced SMS4 Block Cipher[C]//IACR Cryptology ePrint At-chive 01/2008; 2008:281. 被引量:1
  • 8Lu J, Kim J, Kelle N, et al. Improving the Efficiency of Impossible Differential Crypta-nalysis of Reduced Camellia and MISTY [C]//ics in Cryptology - CT-RSA 2008. San Francisco, 2008. 被引量:1
  • 9Eric Brier, Christophe Clavier, Francis Olivier. Correlation Power Analysis with a Leakage Mod-el[C]//proceeding of Cryptographic Hard- ware and Embedded Systems-CHES 2004. 2004:16-29. 被引量:1
  • 10Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C].Cryptographic Hardware Embedded System-CHES 2004Lecture Notes in Computer Science,2004:16-29. 被引量:1

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部