期刊文献+

DES芯片抵御高阶差分功耗分析攻击方法研究

An Approach to Resisting High-Order Differential Power Analysis Attacks on DES Chips
下载PDF
导出
摘要 分析独特的屏蔽方法及改进方法的不足,提出了逻辑层和算法层相结合抵御高阶差分功耗分析攻击的新方法,并给出芯片半定制设计流程.芯片关键部分电路采用自定义功耗恒定逻辑单元实现,非关键部分电路采用CMOS逻辑以减少功耗和面积.整体电路采用独特的屏蔽方法自定义轮实现.结果表明芯片能够抵御高阶差分功耗分析攻击,运算速度与现有方法相当,而所需资源比现有方法少. After analyzing the disadvantage of the unique masking method (UMM) and its improvements,a new approach combining the logic level with the algorithm level is presented to resist high-order differential power analysis (DPA) attacks,and the semi-cus- tom design flow is also given. The critical circuits are implemented with user-defined constant power consuming logic cells, while the non-critical circuits are implemented with CMOS logic to reduce power consumption and area. The whole circuit is implemented with the UMM self-define the round. Experimental results show that our chip can resist high-order DPA attacks. The operation speed is comparable with that by the present methods, but the resource requirements are lower.
出处 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2008年第2期376-380,共5页 半导体学报(英文版)
关键词 高阶差分功耗分析 独特的屏蔽方法 DES 灵敏放大器型逻辑 high-order differential power analysis unique masking method DES sense amplifier based logic
  • 相关文献

参考文献12

  • 1Kocher P,Jaffe J,Jun B. Differential power analysis. Proceedings of Advances in Cryptology (CRYPTO ' 99), 1999 s 388.
  • 2Messerges T S. Using second-order power analysis to attack DPA resistant software. CHES,2000:238.
  • 3Oswald E, Mangard S, Herbst C,et al. Practical second-order DPA attacks for masked smart card implementations of block ciphers. CT-RSA, 2006 : 192.
  • 4Akkar M L, Goubin L. A generic protection against high-order differential power analysis. Fast Software Encryption(FSE2003), 2003 : 192.
  • 5Tiri K, Akmal M, Verbauwhede I. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. Proc of the 28th European Solid-State Circuits Conf,2002 -403.
  • 6童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 7Goubin L, Patarin J. DES and differential power analysis: the duplication method. CHES, 1999 : 158.
  • 8Messerges T S. Securing the AES finalists against power analysis attacks. Fast Software Encryption (FSE2000), 2000 : 150.
  • 9Akkar M L, Giraud C. An implementation of DES and AES, Secure against Some Attacks. CHES,2001:309.
  • 10Akkar M L, Bevan R, Goubin L. Two power analysis attacks against one-mask methods. Fast Software Encryption (FSE2004), 2004 : 332.

二级参考文献16

  • 1ANSI X9.32-American National Standard for Data Encryption Algorithm (DEA). AM. Standards Inst, 1981
  • 2Kocher P,Jaffe J,Jun B. Introduction to differential power analysis and related attacks. http:∥www. cryptography. com/dpa/technical
  • 3Kocher P,Jaffe J,Jun B. Differential power analysis. Proceeding of Advances in cryptography(CRYPTO'99), 1999: 388
  • 4Akkar M L, Christophe Giraud. An implementation of DES and AES,secure against some attacks. CHES,2001:309
  • 5Tiri K, Verbauwhede I. Securing encryption algorithms against DPA at the logic level: next generation smart card technology. CHES, 2003:125
  • 6Fournier J J A,Moore S,Li H Y. Security evaluation of asynchronous circuits. CHES, 2003:137
  • 7Daemen J, Rijmen V. Resistance against implementation attacks:A comparative study of the AES proposals. Second Advanced Encryption Standard Candidate Conference, 1999, http:∥www. nist. gov/aes
  • 8Messerges T S, Dabbish E A, Sloan R H. Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002,51 (5): 541
  • 9Wayner P. Code breaker cracks smart cards' digital safe. New York Times, 1998,22 : C1
  • 10Kocher P,Jaffe J,Jun B.Differential power analysis[C].In:Proc.Of Advances in Cryptology(CRYPTO'99),Lecture Notes in Computer Science,1999,1666:388-397.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部