期刊文献+

一种适用于RFID标签的安全化密码算法实现 被引量:4

A Secure Cipher Implementation Suitable for RFID-Tags
下载PDF
导出
摘要 鉴于射频识别(RFID)标签芯片苛刻的资源要求,为解决差分功耗分析(Differential Power Analysis,DPA)对密码算法实现方面的威胁难题,将新型DPA防护技术threshold与Piccolo密码算法相结合,提出了一种适用于RFID标签芯片应用的安全化密码算法实现方案.分别基于布尔式重组和改进型穷举搜索的方式实现了面积最优的S盒及其逆的threshold(3,3)分享,提出了基于锁存器方式解决S盒及其逆实现中潜在的毛刺威胁问题,在Chartered 0.18μm工艺和100 kHz RFID运行频率下,将该方案的资源消耗控制在2155个等效门,平均电流约为2.60μA,基于FPGA的DPA攻击安全性分析结果表明该方案适合于低成本RFID标签芯片对密码算法轻型及实现安全的要求. Hash resource required for RFID-tags chips,a secure and lightweight cipher implementation is proposed to solve the threat posed by differential power analysis(DPA). The proposed implementation is based on Piccolo cipher, in combination with the recently proposed masking method named threshold. Boolean equation rearrangement and improved exhaustive search method was respectively appfied to S-Box and inverted S-Box to get their optimal area costs for threshold(3,3) share. A method based on latch is proposed to resist the latent glitch threat.Based on Chartered 0.18tZm and 100 kHz operating frequency for RFID applica- tions, the proposed cipher implementation costs as low as 2155 gate equivalents and consumes 2.60t~A average current. The security of the implementation is evaluated based on real power traces from an FPGA platform. DPA attack results show the proposed imple- mentation with threshold countermeasure is suitable for secure low-cost passive RFID-tag ICs.
出处 《电子学报》 EI CAS CSCD 北大核心 2014年第8期1465-1473,共9页 Acta Electronica Sinica
基金 国家自然科学基金(No.61202481)
关键词 RFID标签芯片 安全 Piccolo 差分功耗分析 THRESHOLD RFlD-tags IC security Piccolo differential power analysis(DPA) threshold
  • 相关文献

参考文献22

  • 1Juels A,Weis S A.Authenticating pervasive devices with human protocols[A].2005 25th Annual International Cryptology Conference Proceedings[C].Berlin:Springer,2005.293-308.
  • 2Bogdanov A,Knudsen L R,Leander G,et al.PRESENT:An ultra-lightweight block cipher[A].2007 9th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2007.450-466.
  • 3Shibutani K,Isobe T,Hiwatari H,et al.Piccolo:an ultralightweight blockcipher[A].2011 13th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2011.342-357.
  • 4Guo J,Peyrin T,Poschmann A,et al.The LED block cipher[A].2011 13th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2011.326-341.
  • 5Kocher P,Jaffe J,Jun B.Differential power analysis[A].1999 19th Annual International Cryptology Conference Proceedings[C].Berlin:Springer,1999.388-397.
  • 6Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[A].Joye M.2004 6th International Workshop on Cryptographic Hardware and Embedded Systems Proceedings[C].Berlin:Springer,2004.16-29.
  • 7Breier J,Kleja M.On practical results of the differential power analysis[J].Journal of Electrical Engineering,2012,63 (2):125-129.
  • 8李翔宇,孙义和.采用数据流模式提高乱序执行密码芯片的安全性[J].电子学报,2007,35(2):202-206. 被引量:2
  • 9Canright D,Batina L.A very compact "perfectly masked" Sbox for AES[A].2008 6th International Conference on Applied Cryptography and Network Security Proceedings[C].Berlin:Springer,2008.446-459.
  • 10乐大珩,张民选,李少青,孙岩,谷晓忱.一种新型的抗DPA攻击可配置逻辑结构[J].电子学报,2011,39(2):453-457. 被引量:3

二级参考文献43

  • 1李翔宇,孙义和.用于密码芯片抗功耗攻击的功耗平衡加法器[J].Journal of Semiconductors,2005,26(8):1629-1634. 被引量:3
  • 2高娜娜,李占才,王沁.一种可重构体系结构用于高速实现DES、3DES和AES[J].电子学报,2006,34(8):1386-1390. 被引量:19
  • 3赵佳,曾晓洋,韩军,陈俊.简化的抗零值功耗分析的AES算法及其VLSI实现[J].计算机工程,2007,33(16):220-222. 被引量:1
  • 4P. Kocher, J. Jaffe, B. Jun. Differential power analysis[ A]. Ad vances in Cryptology-CRYPTO' 99: 19th Annual International Cryptology Conference [ C ]. Santa Barbara, CA, USA: Springer-Verlag, 1999.388 - 397.
  • 5F-X Standaert,S B Ors,B Preneel Power analysis of an FPGA implementation of Rijindael: Is pipelining a DPA countermea sure? [ A]. Cryptographic Hardware Embedded System-CHES 20041[ C]. Boston: SpfingerVerlag, 2004.30 - 44.
  • 6S Mangard, N Pramstaller, E Oswald. Successfully attacking masked AES hardware implementations [ A ]. Cryptographic Hardware Embedded System-CHES 2005[ C]. Edinburgh, UK: Springer-Verlag, 2005. 157 - 171.
  • 70 Kommerling,M G Kuhn. Design principles for tamper-resis- tant smartcard processor [A ]. The USENIX Workshop on Smartcard Technology Smartcard 1999 [ C ]. Chicago: USENIX Association, 1999.9 - 20.
  • 8K Tiff, M Akmal, I Verbauwhede. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards[A]. Euro pean Solid-State Circuit Conference-ESSCIRC 2002[ C]. Firenze, Italy: University of Bologna, 2002.403 - 406.
  • 9K Tiri, I Verbauwhede. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation[ A ]. De sign, Automation, and Test in Europe Conference-DATE 21304 [ C] .Paris,France: IEEE Computer Society,2004.246- 251.
  • 10K Tiff, I Verbauwhede. Place and route for secure standard cell design [ A ]. 6th International Conference on Smart Card Research and Advanced Applications-CARDIS 2004[ C ]. Toulouse,France: Springer-Verlag, 2004. 143 - 158.

共引文献16

同被引文献34

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Panda A K, Rajput P, Shukla B. Design of Multi Bit LFSR PNRG and Performance comparison on FPGAusing VHDL[J]. International Journal of Advances in Engineering & Technology (IJAET), 2012, 3(1): 566-57 I.
  • 3Liao Y P, Hsiao C M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol [J]. Ad Hoc Networks, 2014, 18: 133-146.
  • 4Piramuthu S. RFID mutual authentication protocols I-!]. Decision Support Systems, 2011, 50(2): 387-393.
  • 5Yu Y C, Hou T W, Chiang T C. Low cost RI:ID real lightweight binding proof protocol for medication errors and patient safety[J]. Journal of medical systems, 2012, 36(2): 823-828.
  • 6Tian Y, Chen G, Li J. A new ultralightweight RFID authentication protocol with permutation [J]. Communications Letters, IEEE, 2012, 16(5): 702-705.
  • 7Rohrmair U, Holcomb D. PUFs at a glance [ A]. Proceed- ings of Design, Automation and Test in Europe [ C ]. Dres- den, Germany: IEEE,2014,1 - 6.
  • 8Maes R. Physically Unclonable Functions:Constructions, Properties and Applications[ M ]. Berlin Heidelberg: Springer, 2013.
  • 9Pappu R, Recht B, Taylor J, et al. Physical one-way func- tions [ J]. Science,2002,297 (5589) :2026 - 2030.
  • 10Gassend B. Physical Random Functions [ D]. USA: Massa- Chusetts Institute of Technology, 2003.

引证文献4

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部