期刊文献+

USBKey设备功耗采集方法研究 被引量:2

Research on Equipment Power Consumption Acquisition Method for USBKey
下载PDF
导出
摘要 针对USBKey设备功耗采集较为困难的问题,提出一种新的功耗采集方法。通过PC机软件和微程序控制器(MCU)的相互配合,由PC端发送延时命令给MCU,MCU根据命令内容延时发送触发信号,从而保证触发信号和密码算法的同步,以满足不同的USBKey设备的需求。设计采集设备的供电系统,采集时由电容统一供电,从而减少外接电源带来的噪声,通过对PC机软件运行库的添加,将该采集方法拓展至任意USB接口设备。对商用USBKey设备进行功耗采集的实验结果表明,该方法能精确采集功耗信息,有效隔离噪声。 Aiming at the problem that USBKey equipment power acquisition is difficult,a new power consumption acquisition method is proposed.Through the PC software and Microprogrammed Control Unit(MCU),this method uses PC to send delay command to MCU.MCU sends trigger signal according to the order contents delay,so as to ensure the synchronization of trigger signal and the cipher algorithm,and to meet the needs of different USBKey equipment.It designs power supply system of acquisition equipment,and is powered by capacitance.It reduces the noise by external power source.Through adding PC software runtime library,it expands this method to any USB interface equipment.It makes power acquisition for commercial USBKey equipment.Experimental results show that this method can accurately acquire power consumption information,and isolates the noise.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第1期66-70,76,共6页 Computer Engineering
基金 国家"973"计划基金资助项目(2013CB338004) 国家科技重大专项基金资助项目(2014ZX01032401-001) 上海市经信委企业自主创新产学研合作专项基金资助项目(沪CXY-2013-35)
关键词 旁路攻击 USB设备 微程序控制器 功耗采集 示波器触发信号 同步 side channel attack USB equipment Microprogrammed Control Unit(MCU) power consumption acquisition oscilloscope trigger signal synchronization
  • 相关文献

参考文献13

  • 1冯登国著..密码分析学[M].北京:清华大学出版社,2000:129.
  • 2金涛,陈建良,童水光.逆向工程技术研究进展[J].中国机械工程,2002,13(16):1430-1436. 被引量:164
  • 3Kocher P J J,Jun B.Differential Power Analysis[C]//Proceedings of CRYPTO’99.Berlin,Germany:Springer-Verlag,1999:388-397. 被引量:1
  • 4陈艾东..模幂算法功耗分析攻击的研究[D].电子科技大学,2013:
  • 5Quisquater J J,Samyde D.Electromagnetic Analysis(EMA):Measures and Counter-measures for Smart Cards[M].Berlin,Germany:Springer-Verlag,2001. 被引量:1
  • 6Piret G,Quisquater J J.A Differential Fault Attack Technique Against SPN Structures,with Application to the AES and KHAZAD[C]//Proceedings of Workhop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer- Verlag,2003:77-88. 被引量:1
  • 7Schindler W.A Timing Attack Against RSA with the Chinese Remainder Theorem[C]//Proceedings of Work-hop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer-Verlag,2000:109-124. 被引量:1
  • 8张涛..面向密码芯片的旁路攻击关键技术研究[D].电子科技大学,2008:
  • 9Mangard S,Oswald E,Popp T.Power Analysis Attacks:Revealing the Secrets of Smart Cards[M].Berlin,Germany:Springer-Verlag,2008. 被引量:1
  • 10孙敦灿,陈运,万武南,索望.功耗分析平台中混合编程的应用研究[J].成都信息工程学院学报,2011,26(2):127-131. 被引量:3

二级参考文献25

  • 1种永民,杨海成.实物测量造型技术中的数据分块方法[J].机械科学与技术,1996,15(6):989-992. 被引量:11
  • 2廖云伢,王建新,盛羽.基于Java与Matlab集成的虚拟实验平台的设计与实现[J].计算机应用,2007,27(2):394-396. 被引量:16
  • 3[1]Jan Axelson.USB Complete. LakeviewResearch, 1999 被引量:1
  • 4[2]Don Anderson. Universal Serial Bus System Architecture. Addison Wesley Longman, Inc, 2000 被引量:1
  • 5[3]ANALOG DEVICES.ADuC812 User'sManual, 2000 被引量:1
  • 6Kocher P.Timing attack on implementation of diffie-hellman,RSA,DSS and other systems[C] //Advances inCryptology.Santa Barbara,USA:Springer,1996:104-113. 被引量:1
  • 7Kocher P,Jaffe J,Jun B.Differential power analysis[C] //Advances in Cryptology.Santa Barbara,USA:Springer,1999:388-397. 被引量:1
  • 8Brier E,Clavier C,Olivier F.Correlation power analysiswith a leakage model[C] //Cryptographic Hardware andEmbedded Systems.Massachusetts,USA:Springer,2004:16-29. 被引量:1
  • 9Rechberger C,Oswald E.Practical template attacks[C] //Information Security Applications.Jeju Island,Korea:Springer,2004:440-456. 被引量:1
  • 10Schramm K,Wollinger T,Paar C.A new class of collisionattacks and its application to des[C] //Fast SoftwareEncryption.Lund,Sweden:Springer,2003:206-222. 被引量:1

共引文献176

同被引文献9

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部