期刊文献+

基于walsh谱的功耗分析建模及仿真研究

Modeling and simulation of power analysis based on walsh spectrum
原文传递
导出
摘要 功耗分析能有效析出内嵌AES密码芯片的密钥,为了证明AESS盒和功耗分析内在联系,找到防范功耗分析的办法,该文通过分析AES差分功耗分析和相关功耗分析建模原理,结合walsh谱的分析方法,提出基于walsh谱的功耗分析的新方法,证明了分组密码布尔函数非线性度越高,密码防范功耗分析能力就越弱的结论.实验表明,相对差分和相关功耗分析而言,基于Walsh谱的功耗分析有效提高了析出密钥的效率和精度.图3,表1,参8. AES cryptosystems embedded in cryptographic devices are sensitive to a series of cryptanalysis such as power analysis. To prevent power analysis attacks, the relation of AES S-box and power analysis is analyzed. Based the walsh spectrum method, the fundamental principles of differential power analysis and correlation power analysis against AES are described. A new method based on walsh spectrum is proposed to reveal the key embedded in cryptographic. Furthermore, conclusion are drawn and proved that the vulnerability against power analysis caused by the highly nonlinear S-boxes. The results indicate that the new method speeds up the revelation of key and yields higher precision. 3figs., ltab., 8refs.
出处 《湖南科技大学学报(自然科学版)》 CAS 北大核心 2009年第3期91-95,共5页 Journal of Hunan University of Science And Technology:Natural Science Edition
基金 湖南省教育厅资助科研项目(08C335)
关键词 差分功耗分析 相关功耗分析 高级加密标准 沃尔什谱 非线性度 differential power analysis correlation power analysis AES walsh spectrum nonlinearity
  • 相关文献

参考文献7

  • 1Christoph H, Elisabeth O, Stefan M. An AES smart card implementation resistant to power analysis attacks [C]// Lecture Notes in Computer Science: ACNS2006. Berlin: Springer-Verlag, 9006, 3989 : 239-252.
  • 2Paul K, Joshua J, Benjamin J. Differential power analysis[C]//Advanced in Cryptology-CRYPTO' 99. California, USA: Springer-Verlag, 1999: 388-397.
  • 3HAN Yu ZOU Xue-cheng LIU Zheng-lin CHEN Yi-cheng.The research of DPA attacks against AES implementations[J].The Journal of China Universities of Posts and Telecommunications,2008,15(4):101-106. 被引量:1
  • 4Eric B, Christophe C, Francis O. Correlation power analysis with a leakage model [C]//Lecture Notes in Computer Science: CHES 2004. Berlin: Springer-Verlag, 2004, 3156:16-29.
  • 5Masserges, Thomas S. Using second-order power analysis to attack DPA resistant software [C]//Lecture Notes in Computer Science: CHES 2000. Berlin: Spfinger-Verlag, 2000, 1965:238-251.
  • 6R' egis B, Erik K. Ways to enhance differential power analysis [C] //Lecture Notes in Computer Science: ICISC 2002. Berlin: Springer-Verlag, 2003, 2587: 327-342.
  • 7Emmanuel P. DPA atacks and S-boxes [C]//Fast Software Encryption : 12th International Workshop. Paris, France: Springer-Verlag, 2005, 3557: 424-441.

二级参考文献9

  • 1Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Aug 15-19, 1999, Santa Barbara, CA, USA. Berlin, Germany: Springer, 1999:398-412
  • 2Brier E, Clavier C, Oliver F. Correlation power analysis with a leakage model. Workshop on Cryptographic Hardware and Embedded Systems (CHES2004), Aug 16-19, 2004, Cambridge, MA, USA. 2004:16-29
  • 3Messerges T, Dabbish E, Sloan R. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computer, 2002, 51(5): 541-552
  • 4Standaert F, Ors S, Quisquater J, et al. Power analysis attacks against FPGA implementations of the DES. Workshop on Cryptographic Hardware and Embedded Systems (CHES2004), Aug 16-19, 2004, Cambridge, MA, USA. 2004:30-44
  • 5Ors S, Gurkaynak F, Oswald E, et al. Power analysis attack on an ASIC AES implementation. Proceeding of International Conference on Information Technology (ITCC 2004), Apr 5-7, 2004, Las Vegas, NV, USA. 2004:546-552
  • 6Federal Information Processing Standards Publication 197. Announcing the Advanced Encryption Standard (AES), November, 2001
  • 7Koeune F, Standaert F X. A tutorial on physical security and side-channel attacks. Proceedings of 5th International School on Foundations of Security Analysis and Design (LNCS 3655), Sep 19 24, 2005, Bertinoro, Italy. 2005:78-108
  • 8Pramstaller N, Mangard S, Dominikus S, et al. Efficient AES implementations on ASICs and FPGAs. 4 th International Conference of AES2004 (LNCS 3373), May 10-12, 2004. Bonn, Germany, 2004: 98-112
  • 9Rabaey J M, Chandrakasan A, Nikolic B. Digital integrated circuits, a design perspective. Second Edition. Upper Saddle River, NJ, USA: Prentice-Hall, 2003

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部