Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an ...Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA.展开更多
Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of diffe...Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.展开更多
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA...An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.展开更多
In terms of model-free voltage control methods,when the device or topology of the system changes,the model’s accuracy often decreases,so an adaptive model is needed to coordinate the changes of input.To overcome the ...In terms of model-free voltage control methods,when the device or topology of the system changes,the model’s accuracy often decreases,so an adaptive model is needed to coordinate the changes of input.To overcome the defects of a model-free control method,this paper proposes an automatic voltage control(AVC)method for differential power grids based on transfer learning and deep reinforcement learning.First,when constructing the Markov game of AVC,both the magnitude and number of voltage deviations are taken into account in the reward.Then,an AVC method based on constrained multiagent deep reinforcement learning(DRL)is developed.To further improve learning efficiency,domain knowledge is used to reduce action space.Next,distribution adaptation transfer learning is introduced for the AVC transfer circumstance of systems with the same structure but distinct topological relations/parameters,which can perform well without any further training even if the structure changes.Moreover,for the AVC transfer circumstance of various power grids,parameter-based transfer learning is created,which enhances the target system’s training speed and effect.Finally,the method’s efficacy is tested using two IEEE systems and two real-world power grids.展开更多
A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random...A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.展开更多
Modern fault-resilient microgrids(MGs)require the operation of healthy phases during unbalanced short-circuits to improve the system reliability.This study proposes a differential power based selective phase tripping ...Modern fault-resilient microgrids(MGs)require the operation of healthy phases during unbalanced short-circuits to improve the system reliability.This study proposes a differential power based selective phase tripping scheme for MGs consisting of synchronous and inverter-interfaced distributed generators(DGs).First,the differential power is computed using the line-end superimposed voltage and current signals.Subsequently,to make the scheme threshold-free,a power coefficient index is derived and used for identifying faulted phases in an MG.The protection scheme is tested on a standard MG operating in either grid-connected or islanding mode,which is simulated using PSCAD/EMTDC.The efficacy of the scheme is also assessed on the OPAL-RT manufactured real-time digital simulation(RTDS)platform.Further,the performance of the proposed protection scheme is compared with a few existing methods.The results show that the selective tripping of faulted phases in MGs can be achieved quickly and securely using the proposed scheme.展开更多
Partial shading and mismatch conditions among the series-connected modules/sub-modules suffer from a nonconvex power curve with multiple local maxima and decreased peak power for the whole string. Energy transfer betw...Partial shading and mismatch conditions among the series-connected modules/sub-modules suffer from a nonconvex power curve with multiple local maxima and decreased peak power for the whole string. Energy transfer between the sub-modules brings them to the same operating voltage, and this collective operation produces a convex power curve, which results in increased peak power for the string. The proposed topology benefits from the switched-capacitor (SC) converter concept and is an application for sub-module-level power balancing with some novelties, including stopping the switching in absence of shading, string-level extension, and a reduced number of power electronics components as compared to those in the literature. Reduction in the number of power electronics components is realized by the fact that two sub-modules share one SC converter. This leads to reduced power electronics losses as well as less cost and volume of the converter circuit. Insertion loss analysis of the topology is presented. The proposed topology is simulated in the PSpice environment, and a prototype is built for experimental verification. Both simulation and experimental results confirm the loss analysis. This proves that with the proposed topology it is possible to extract almost all the power available on the partially shaded string and transfer it to the load side.展开更多
By a rearrangement of the traditional supply-converter-load system connection,partial-power-processing-based converters can be used to achieve a reduction in size and cost,increase in system efficiency and lower devic...By a rearrangement of the traditional supply-converter-load system connection,partial-power-processing-based converters can be used to achieve a reduction in size and cost,increase in system efficiency and lower device power rating.The concept is promising for different applications such as photovoltaic arrays,electric vehicles and electrolysis.For photovoltaic applications,it can drive each cell in the array to its maximum power point with a relatively smaller converter;for electric-vehicle applications,both an onboard charger with reduced weight and improved efficiency as well as a fast charger station handling higher power can be considered.By showing different examples of partial-power-processing application for energy-conversion and storage units and systems,this paper discusses key limitations of partial-power-processing and related improvements from different perspectives to show the potential in future power electronic systems.展开更多
A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanc...A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%.展开更多
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea...Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.展开更多
Side-channel attacks(SCAs)play an important role in the security evaluation of cryptographic devices.As a form of SCAs,profiled differential power analysis(DPA)is among the most powerful and efficient by taking advant...Side-channel attacks(SCAs)play an important role in the security evaluation of cryptographic devices.As a form of SCAs,profiled differential power analysis(DPA)is among the most powerful and efficient by taking advantage of a profiling phase that learns features from a controlled device.Linear regression(LR)based profiling,a special profiling method proposed by Schindler et al.,could be extended to generic-emulating DPA(differential power analysis)by on-the-fly profiling.The formal extension was proposed by Whitnall et al.named SLR-based method.Later,to improve SLR-based method,Wang et al.introduced a method based on ridge regression.However,the constant format of L-2 penalty still limits the performance of profiling.In this paper,we generalize the ridge-based method and propose a new strategy of using variable regularization.We then analyze from a theoretical point of view why we should not use constant penalty format for all cases.Roughly speaking,our work reveals the underlying mechanism of how different formats affect the profiling process in the context of side channel.Therefore,by selecting a proper regularization,we could push the limits of LR-based profiling.Finally,we conduct simulation-based and practical experiments to confirm our analysis.Specifically,the results of our practical experiments show that the proper formats of regularization are different among real devices.展开更多
This paper deals with the approximate controllability of semilinear neutral functional differential systems with state-dependent delay. The fractional power theory and α-norm are used to discuss the problem so that t...This paper deals with the approximate controllability of semilinear neutral functional differential systems with state-dependent delay. The fractional power theory and α-norm are used to discuss the problem so that the obtained results can apply to the systems involving derivatives of spatial variables. By methods of functional analysis and semigroup theory, sufficient conditions of approximate controllability are formulated and proved. Finally, an example is provided to illustrate the applications of the obtained results.展开更多
This paper presents an AES(advanced encryption standard) chip that combats differential power analysis (DPA) side-channel attack through hardware-based random order execution.Both decryption and encryption procedu...This paper presents an AES(advanced encryption standard) chip that combats differential power analysis (DPA) side-channel attack through hardware-based random order execution.Both decryption and encryption procedures of an AES are implemented on the chip.A fine-grained dataflow architecture is proposed,which dynamically exploits intrinsic byte-level independence in the algorithm.A novel circuit called an HMF(Hold-MatchFetch) unit is proposed for random control,which randomly sets execution orders for concurrent operations.The AES chip was manufactured in SMIC 0.18μm technology.The average energy for encrypting one group of plain texts(128 bits secrete keys) is 19 nJ.The core area is 0.43 mm^2.A sophisticated experimental setup was built to test the DPA resistance.Measurement-based experimental results show that one byte of a secret key cannot be disclosed from our chip under random mode after 64000 power traces were used in the DPA attack.Compared with the corresponding fixed order execution,the hardware based random order execution is improved by at least 21 times the DPA resistance.展开更多
文摘Differential Power Analysis (DPA) is an effective attack method to break the crypto chips and it has been considered to be a threat to security of information system. With analyzing the prin-ciple of resisting DPA,an available countermeasure based on randomization is proposed in this paper. Time delay is inserted in the operation process and random number is precharged to the circuit during the delay time,the normal schedule is disturbed and the power is randomized. Following this meth-odology,a general DPA resistance random precharge architecture is proposed and DES algorithm following this architecture is implemented. This countermeasure is testified to be efficient to resist DPA.
基金financially supported by the National Natural Science Foundation of China(52074089 and 51534004)Natural Science Foundation of Heilongjiang Province of China(LH2019E019)。
文摘Based on the“three box”exergy analysis model,a black box-gray box hierarchical exergy analysis and evaluation method is put forward in this paper,which is applied to evaluate the power generation technology of differential pressure produced by natural gas expansion.By using the exergy analysis theory,the black box-gray box hierarchical exergy analysis models of three differential pressure power generation technologies are established respectively.Firstly,the“black box”analysis models of main energy consuming equipment are established,and then the“gray box”analysis model of the total system is established.Based on the calculation results of exergy analysis indexes,the weak energy consumption equipment in the whole power generation process is accurately located.Taking a gas field in southwest China as an example,the comprehensive energy consumption evaluation of the three power generation technologies is carried out,and the technology with the best energy consumption condition among the three technologies is determined.Finally,the rationalization improvement measures are put forward from improving the air tightness,replacing the deflector and reducing the flow loss.
基金supported by the National Natural Science Foundation of China(60373109)Ministry of Science and Technologyof China and the National Commercial Cryptography Application Technology Architecture and Application DemonstrationProject(2008BAA22B02).
文摘An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.
基金supported by the National Science Foundation of China(U1866602).
文摘In terms of model-free voltage control methods,when the device or topology of the system changes,the model’s accuracy often decreases,so an adaptive model is needed to coordinate the changes of input.To overcome the defects of a model-free control method,this paper proposes an automatic voltage control(AVC)method for differential power grids based on transfer learning and deep reinforcement learning.First,when constructing the Markov game of AVC,both the magnitude and number of voltage deviations are taken into account in the reward.Then,an AVC method based on constrained multiagent deep reinforcement learning(DRL)is developed.To further improve learning efficiency,domain knowledge is used to reduce action space.Next,distribution adaptation transfer learning is introduced for the AVC transfer circumstance of systems with the same structure but distinct topological relations/parameters,which can perform well without any further training even if the structure changes.Moreover,for the AVC transfer circumstance of various power grids,parameter-based transfer learning is created,which enhances the target system’s training speed and effect.Finally,the method’s efficacy is tested using two IEEE systems and two real-world power grids.
文摘A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments.
文摘Modern fault-resilient microgrids(MGs)require the operation of healthy phases during unbalanced short-circuits to improve the system reliability.This study proposes a differential power based selective phase tripping scheme for MGs consisting of synchronous and inverter-interfaced distributed generators(DGs).First,the differential power is computed using the line-end superimposed voltage and current signals.Subsequently,to make the scheme threshold-free,a power coefficient index is derived and used for identifying faulted phases in an MG.The protection scheme is tested on a standard MG operating in either grid-connected or islanding mode,which is simulated using PSCAD/EMTDC.The efficacy of the scheme is also assessed on the OPAL-RT manufactured real-time digital simulation(RTDS)platform.Further,the performance of the proposed protection scheme is compared with a few existing methods.The results show that the selective tripping of faulted phases in MGs can be achieved quickly and securely using the proposed scheme.
基金Project supported by the BAP Department of Karabuk University,Turkey(No.KBU-BAP-13/2-DR-010)
文摘Partial shading and mismatch conditions among the series-connected modules/sub-modules suffer from a nonconvex power curve with multiple local maxima and decreased peak power for the whole string. Energy transfer between the sub-modules brings them to the same operating voltage, and this collective operation produces a convex power curve, which results in increased peak power for the string. The proposed topology benefits from the switched-capacitor (SC) converter concept and is an application for sub-module-level power balancing with some novelties, including stopping the switching in absence of shading, string-level extension, and a reduced number of power electronics components as compared to those in the literature. Reduction in the number of power electronics components is realized by the fact that two sub-modules share one SC converter. This leads to reduced power electronics losses as well as less cost and volume of the converter circuit. Insertion loss analysis of the topology is presented. The proposed topology is simulated in the PSpice environment, and a prototype is built for experimental verification. Both simulation and experimental results confirm the loss analysis. This proves that with the proposed topology it is possible to extract almost all the power available on the partially shaded string and transfer it to the load side.
文摘By a rearrangement of the traditional supply-converter-load system connection,partial-power-processing-based converters can be used to achieve a reduction in size and cost,increase in system efficiency and lower device power rating.The concept is promising for different applications such as photovoltaic arrays,electric vehicles and electrolysis.For photovoltaic applications,it can drive each cell in the array to its maximum power point with a relatively smaller converter;for electric-vehicle applications,both an onboard charger with reduced weight and improved efficiency as well as a fast charger station handling higher power can be considered.By showing different examples of partial-power-processing application for energy-conversion and storage units and systems,this paper discusses key limitations of partial-power-processing and related improvements from different perspectives to show the potential in future power electronic systems.
基金Project supported by the Zhejiang Provincial Natural Science Foundation of China(No.LQ14F040001)the National Natural Science Foundation of China(Nos.61274132,61234002)the K.C.Wong Magna Fund in Ningbo University,China
文摘A power balance static random-access memory(SRAM) for resistance to differential power analysis(DPA) is proposed. In the proposed design, the switch power consumption and short-circuit power consumption are balanced by discharging and pre-charging the key nodes of the output circuit and adding an additional shortcircuit current path. Thus, the power consumption is constant in every read cycle. As a result, the DPA-resistant ability of the SRAM is improved. In 65 nm CMOS technology, the power balance SRAM is fully custom designed with a layout area of 5863.6 μm^2.The post-simulation results show that the normalized energy deviation(NED) and normalized standard deviation(NSD) are 0.099% and 0.04%, respectively. Compared to existing power balance circuits, the power balance ability of the proposed SRAM has improved 53%.
基金the Software and Integrated CircuitIndustries Development Foundation of Shanghai(No.12Z116010001)
文摘Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.
基金supported by the State Grid Science and Technology Project of China under Grant No.546816190003.
文摘Side-channel attacks(SCAs)play an important role in the security evaluation of cryptographic devices.As a form of SCAs,profiled differential power analysis(DPA)is among the most powerful and efficient by taking advantage of a profiling phase that learns features from a controlled device.Linear regression(LR)based profiling,a special profiling method proposed by Schindler et al.,could be extended to generic-emulating DPA(differential power analysis)by on-the-fly profiling.The formal extension was proposed by Whitnall et al.named SLR-based method.Later,to improve SLR-based method,Wang et al.introduced a method based on ridge regression.However,the constant format of L-2 penalty still limits the performance of profiling.In this paper,we generalize the ridge-based method and propose a new strategy of using variable regularization.We then analyze from a theoretical point of view why we should not use constant penalty format for all cases.Roughly speaking,our work reveals the underlying mechanism of how different formats affect the profiling process in the context of side channel.Therefore,by selecting a proper regularization,we could push the limits of LR-based profiling.Finally,we conduct simulation-based and practical experiments to confirm our analysis.Specifically,the results of our practical experiments show that the proper formats of regularization are different among real devices.
基金supported by the National Natural Science Foundation of China(Nos.11171110,11371087)the Science and Technology Commission of Shanghai Municipality(No.13dz2260400)the Shanghai Leading Academic Discipline Project(No.B407)
文摘This paper deals with the approximate controllability of semilinear neutral functional differential systems with state-dependent delay. The fractional power theory and α-norm are used to discuss the problem so that the obtained results can apply to the systems involving derivatives of spatial variables. By methods of functional analysis and semigroup theory, sufficient conditions of approximate controllability are formulated and proved. Finally, an example is provided to illustrate the applications of the obtained results.
基金supported by the National Natural Science Foundation of China(No.61006021)the Beijing Natural Science Foundation(No. 4112029)
文摘This paper presents an AES(advanced encryption standard) chip that combats differential power analysis (DPA) side-channel attack through hardware-based random order execution.Both decryption and encryption procedures of an AES are implemented on the chip.A fine-grained dataflow architecture is proposed,which dynamically exploits intrinsic byte-level independence in the algorithm.A novel circuit called an HMF(Hold-MatchFetch) unit is proposed for random control,which randomly sets execution orders for concurrent operations.The AES chip was manufactured in SMIC 0.18μm technology.The average energy for encrypting one group of plain texts(128 bits secrete keys) is 19 nJ.The core area is 0.43 mm^2.A sophisticated experimental setup was built to test the DPA resistance.Measurement-based experimental results show that one byte of a secret key cannot be disclosed from our chip under random mode after 64000 power traces were used in the DPA attack.Compared with the corresponding fixed order execution,the hardware based random order execution is improved by at least 21 times the DPA resistance.