期刊文献+

针对密码芯片的相关性功耗分析实验平台研究 被引量:1

Research on Correlation Power Analysis Experimental Platform for Cipher Chip
下载PDF
导出
摘要 相关性功耗分析攻击是破解密码芯片密钥的有效方法,现有的CPA攻击缺少有效的仿真验证工具和高效一体化、易用的实验平台。在分析了CPA攻击原理及功耗模型的基础上,设计了一个针对密码芯片的相关性功耗分析实验平台,成功的对普通AES、固定值掩码AES、循环S盒掩码AES加密算法进行了相关性功耗攻击。实验证明,该平台操作简单,实现了数据处理的并行性,提高了功耗攻击的准确度和效率。 Correlation power analysis attack is an effective method to crack the key of cipher chip.The existing CPA attack lacks effective simulation tools and an efficient and integrated experimental platform.By analyzing the CPA attack principle and power consumption model,developed a correlation power analysis experiment platform for cryptographic chips,and successful implementation of correlation power attack on AES,fixed value mask AES,and rotating S-Box masking AES encryption algorithm.The experiments show that the platform is simple,has realized the data processing of parallelism,enhance the accuracy of the attack power consumption and efficiency.
作者 焦铬 李浪 邹祎 JIAO Ge;LI Lang;ZOU Yi(Colleage of Computer Science and Technology,Hengyang Normal University,Hengyang Hunan 421002,China)
出处 《衡阳师范学院学报》 2018年第3期24-27,共4页 Journal of Hengyang Normal University
基金 湖南省教育厅科学研究优秀青年项目(16B039) 湖南省自然科学基金面上项目(2017JJ2010)
关键词 密码芯片 侧信道攻击 相关系数 AES cipher chip side channel attack correlation coefficients advanced encryption standard
  • 相关文献

参考文献4

二级参考文献16

  • 1刘鸣,陈弘毅,白国强.功耗分析研究平台及其应用[J].微电子学与计算机,2005,22(7):134-138. 被引量:15
  • 2Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C].Cryptographic Hardware Embedded System- CHES.USA:Springer-Verlag,2004:16-29. 被引量:1
  • 3Mangard S, Pramstaller N, Oswald E. Successfully attacking masked AES hardware implementations [C]. Cryptographic Hardware and Embedded Systems-CHES,7th International Workshop,2005:157-171. 被引量:1
  • 4Kris Tiri,Ingrid Verbauwhede.Simulation models for side-channel information leaks[C].Anaheim,California,USA:DAC,2005: 13-17. 被引量:1
  • 5Eric Peeters,Francois-Xavier Standaert,Jea-Jacques Quisquater. Power and electromagnetic analysis: Improved model, consequences and comparisons[J].Elsevier Science,2006(1): 1 - 16. 被引量:1
  • 6Christoph Herbst, Elisabeth Oswald, Stefan Mangard. An AES smart card implementation resistant to power analysis attacks [C].ACNS,2006:239-252. 被引量:1
  • 7Koeher P,Lee R,et al. Security as a New Dimension in Embedded System Design [C]//DAC 2004. San Diego, California, USA, 2004 : 753-760. 被引量:1
  • 8Bucci M, Giancane L, Luzzi R, et al. Enhancing power analysis attacks against cryptographic devices[J]. IET on Circuits, Devices & Systems, 2008,2(3): 298-305. 被引量:1
  • 9Kocher P,Jaffe J, J un B. Differential Power Analysis[C]// Proceedings of Advances in Cryptology-CRYPTO ' 99. Santa, Barbara, CA, USA, 1999 : 388-397. 被引量:1
  • 10RAVI S,KOCHER P C,LEE R B. Security as a new dimension in embedded system design[A].New York:ACM,2004.753-760. 被引量:1

共引文献4

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部