期刊文献+

抗DPA攻击的AES算法研究与实现 被引量:1

Research and Implementation of DPA Resistant AES Algorithm
在线阅读 下载PDF
导出
摘要 Mask技术破坏了加密过程中的功率消耗与加密的中间变量之间的相关性,提高了加密器件的抗DPA攻击能力。简单地对算法流程添加Mask容易受到高阶DPA攻击的。提出了一种对AES加密过程的各个操作采用多组随机Mask进行屏蔽的方法,并在8bit的MCU上实现了该抗攻击的AES算法。实验结果表明,添加Mask后的抗DPA攻击AES算法能够有效地抵御DPA和高阶DPA的攻击。 To improve the DPA (differential power analysis) resistance of a cryptographic device, Mask is used to make the power consumption independent of the intermediate values. High order DPA can attack cryptographic device with simple Masks. A DPA resistant AES (advanced encryption standard) Mask algorithm with several random Masks is proposed. The algorithm is implemented on an 8 bit MCU. The result shows that the DPA resistant AES algorithm can defend DPA and high order DPA analysis efficiently.
出处 《计算机科学与探索》 CSCD 2009年第4期405-412,共8页 Journal of Frontiers of Computer Science and Technology
基金 国家高技术研究发展计划(863)No.2005AA1Z1080 2007AA012459~~
关键词 差分功耗攻击 掩码技术 高级加密标准 S盒 differential power analysis (DPA) Mask advanced encryption standard (AES) Sbox
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]Data Encryption Standard. Federal information processing standard (FIPS) Publication 46. National Bureau of Standards, US Department of Commerce, Washington DC, 1977
  • 2[2]Menezes A.,van Oorschot P. ,Vanstone S..Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996
  • 3[3]Anderson, Kuhn M. G.. Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, Paris, 1997, 125~136
  • 4[4]Anderson R. J., Kuhn M. G.. Tamper resistance--a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland California, 1996, 1~11
  • 5[5]Kocher P., Jaffe J., Jun B.. Differential power analysis. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA, USA, 1999, 388~397
  • 6[6]Messerges T. S., Dabbish E. A., Sloan R. H.. Investigations of power analysis attacks on smartcards. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, Illinois, USA, 1999, 151~161
  • 7[7]Chari S., Jutla C., Rao J., Rohatgi P.. Towards sound approaches to counteract power-analysis attacks. In: Proceedings of Advances in Cryptology-CRYPTO'99, Santa Barbara, CA,USA,1999, 398~412
  • 8[8]Kelsey J., Schneier B., Wagner D., Hall C.. Side channel cryptanalysis of product ciphers. In: Proceedings of, ESORICS'98, Louvain-La-Neuve, Belgium, 1998, 97~110
  • 9[9]Messerges T. S.. Securing the AES finalists against power analysis attacks. In: Proceedings of the Fast Software Encryption Workshop 2000, New York, 2000, 150~164

共引文献19

同被引文献84

  • 1赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 2Mangard S, Oswald E, and Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards[M]. Graz University of Technology, Austria, Published by Springer, 2007: 1-306.
  • 3Kocher P C. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems[C]. Advances in Cryptology(CRYPTO'96), Berlin, Springer, 1996, LNCS 1109: 104-113.
  • 4Kocher P C, Jaffe J, Jun B, et al.. Differential power analysis [C]. CRYPTO'99, Santa Barbara, CA, USA, Lecture Notes in Computer Science, Aug. 15-19, 1999: 388-397.
  • 5Gandolfi K, Mourtel C, and Olivier F. Electromagnetic analysis: concrete results[C]. CHES 2001, 2001, LNCS 2162: 251-261.
  • 6Alioto M, Poli M, and Rocchi S. A general power model of differential power analysis attacks to static logic circuits [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2010, 18(5): 711-724.
  • 7Wang Peng-jun and Hao Li-peng. A novel differential fault analysis on AES-128[C]. 2011 IEEE 9th International Conference on ASIC (ASICON), Xiamen, China, Oct. 25-28, 2011: 9-12.
  • 8Lu Y, Boey K, Hodgers P, et al.. Lightweight DPA resistant solution on FPGA to counteract power models[C]. 2010 International Conference on Field-Programmable Technology (FPT), Beijing, China, Dec. 8-10, 2010: 178-183.
  • 9Bodhisatwa M, Debdeep M, and Indranil S. Design for security of block cipher S-boxes to resist differential power attacks[C]. 2012 25th International Conference on VLSI Design (VLSID), Hyderabad, India, Jan. 7-11, 2012: 113-118.
  • 10Mangard G. Securing implementations of block ciphers against side channel attacks[D]. [Ph.D. dissertation], Austria, Graz University of Technology, 2004.

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部