期刊文献+

基于FPGA的串口通信AES加密模块硬件木马设计与检测 被引量:1

Design and Detection of Hardware Trojan for AES Encryption Module in Serial Communication Based on FPGA
原文传递
导出
摘要 高级加密标准(Advanced Encryption Standard,AES)算法安全性强、可靠性高,但密钥仍有泄露可能,造成信息安全事件或事故。为了更好地检测和防范硬件木马,针对广泛应用的串口通信,基于FPGA开发板,首先,设计一款用于窃取AES加密模块密钥的硬件木马,实现密钥获取;其次,鉴于硬件木马会导致器件功耗发生变化,采用基于功耗分析技术的侧信道分析方法,对硬件木马进行检测。搭建实验装置对设计方案进行测试,表明:1)该硬件木马能够使密钥信息发生泄露;2)含木马、无木马的电路频谱波形相关性较低,侧信道分析方法能够检测出硬件木马的侵入。 Advanced Encryption Standard(AES)algorithm has strong security and high reliability,but key leakage may still occur,causing information security events or accidents.In order to better detect and guard against hardware Trojan,aiming at the widely used serial communication,based on the FPGA development board,firstly,a hardware Trojan is designed to steal the key of AES encryption module to achieve key acquisition;secondly,in view that the hardware Trojan will lead to the changes in the device power consumption,the side channel analysis method based on the power consumption analysis technology is used to detect hardware Trojan.The experiment devices are built for the test of design scheme,showing that:1)the hardware Trojan can leak the key information;2)the frequency spectrum of the circuit with and without Trojan has low correlation,and the side channel analysis method can detect the intrusion of the hardware Trojan.
作者 郭青帅 翟腾 高宏玲 GUO Qing-shuai;ZHAI Teng;GAO Hong-ling(Center of Computer and Microelectronics Industry Development,MIIT(China Software Testing Center),Beijing 100048,China)
出处 《工业技术创新》 2019年第6期32-37,共6页 Industrial Technology Innovation
关键词 硬件木马 高级加密标准(AES) 串口通信 密钥 侧信道分析 Hardware Trojan Advanced Encryption Standard(AES) Serial Communication Key Side Channel Analysis
  • 相关文献

参考文献1

二级参考文献8

  • 1Lin L, Burleson W, Paar C. MOLES: molicious off-chip leakage en- abled by side-channels. Proceedings of the 2009 International Confer- ence on Computer-aided Design. New York: ACM, 2009:117--122. 被引量:1
  • 2Abramovici M, Bradley P. Integrated circuit security-new threats and solutions. Cyber Security and Information Infrastructure ResearchWorkshop ( CSIIRW'09 ), 2009. 被引量:1
  • 3Koushanfar F, Mirhoseini A. A unified framework for multimodal submodular integrated circuits trojan detection. IEEE Transactions on Information Forensics and Security, 2011 ,6 ( 1 ) : 162--174. 被引量:1
  • 4King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware. Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008:1--8. 被引量:1
  • 5Banga M, Hsiao M. Novel sustained vector technique for the detection of hardware trojans. Proceedings of 22nd International Conference on VLSI design, 2009 : 327--332. 被引量:1
  • 6Lamech C, Rad R, Tehranipoor M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting trojans and methods for achieving the requied detection sensitivities. IEEE Transactions on Information Forensics and Security, 2011, 6 (3): 142--155. 被引量:1
  • 7张鹏,邹程,邓高明,陈开颜.基于电磁泄漏相关性分析的硬件木马设计[J].华中科技大学学报(自然科学版),2010,38(10):22-25. 被引量:17
  • 8刘长龙,赵毅强,史亚峰,冯紫竹.基于侧信道分析的硬件木马建模与优化[J].华中科技大学学报(自然科学版),2013,41(2):53-57. 被引量:13

共引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部