期刊文献+

基于熵率的密码芯片抵御SPA功耗攻击能力的量化方法

Quantitative Methods Based on Entropy Rate to Measure Capability for Cipher Chip to Defense Power Attacks
在线阅读 下载PDF
导出
摘要 通过大量的工程实验获得了描述密码芯片功耗泄漏量随机性的两个关键指标:一是门级翻转数量的分布律,二是门级翻转数量的转移矩阵。以这两个关键指标为基础,引入信息论中熵率的概念,通过熵率的值动态地测量密码芯片在加密过程中功耗波形的熵值随机器周期数量的增长速度,进而有效地衡量密码芯片在SPA攻击下所具备的防御性能。 Two key indicators to descript randomness of cipher chip power leakage were obtained through a large number of engineering experiments: one is the distribution law of gate-level flip number, another one is the transition matrix of the number of gate-level flip. Based on the two key indicators,we introduced the concept of entropy rate in informa- tion theory. Through the entropy rate, we can dynamicly measure the speed of the entropy increasing about the power consumption waveform in the encryption process, and effectively measure the defensive performance of the cipher chip under SPA attack.
出处 《计算机科学》 CSCD 北大核心 2013年第6期116-118,共3页 Computer Science
基金 国家自然科学基金(61072047)资助
关键词 SPA攻击 熵率 防御性能量化 信息安全 SPA attack, Entropy rate, Quantify of the defence capability, Information security
  • 相关文献

参考文献8

  • 1吴克辉,王韬,赵新杰,刘会英.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,38(12):53-56. 被引量:6
  • 2姚剑波.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2011,11(3):131-133.
  • 3姚剑波,张涛.基于互信息博弈的侧信道攻击安全风险评估[J].计算机科学,2012,39(B06):69-71. 被引量:2
  • 4JoyeM,Paillier P,Schoenmakers B.On second-order differential power analysis[C]//Proc of Cryptograph ic Hardware and Embedded Systems (CHES 2005),LNCS 3659.Springer-Verlag,2005:293-308.
  • 5童元满,戴葵,陆洪毅,王志英.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16. 被引量:5
  • 6Veyrat-Charvillon N,Standaert F-X.Mutual information analysis:how,when and why?[C]//The Proceedings of CHES 2009,Lausanne,Switzerland,September 2009.Lecture Notes in Computer Science,vol.5747,Springer,Berlin,2009:429-443.
  • 7Standaert F-X,Veyrat-Charvillon N,Oswald E,et al.The world is not enough:another look on second-order DPA[C]//The Proceedings of Asiacrypt 2010,Singapore,December 2010.Lecture Notes in Computer Science,vol.6477.Springer,Berlin,2010:112-129.
  • 8Rivain M,Dottax E,Prouff E.Block ciphers implementations provably secure against second-orderside-channel analysis[C]//The Proceedings of FSE 2008,Lausanne,Switzerland,February 2008.LectureNotes in Computer Science,vol.5086.Springer,Berlin,2008:127-143.

二级参考文献25

  • 1李鹤田,刘云,何德全.信息系统安全风险评估研究综述疆[J].中国安全科学学报,2006,16(1):108-113. 被引量:35
  • 2王伟,李春平,李建彬.信息系统风险评估方法的研究[J].计算机工程与设计,2007,28(14):3473-3475. 被引量:16
  • 3Garey M, Jollllson D. Computers and Interactability a guide to the theory of NP-completenss. Freemall: 251-260.
  • 4Bogdanov A. Improved Side-channel Collision Attacks onAES [A]//SAC2007 [C]. LNC S 4876, Ottawa Canada, August 2007 : 84 -95.
  • 5Bogdanov A, Kizhvatov I, Pyshkin A. Algebraic Methods in Side-channel Collision Attacks and Practical Collision Detection [A]//Indocrypt 2008 [C]. LNCS 5365, Kharagpur, India, De cember 2008,251-265.
  • 6Oren Y, Kirschbaum M. Algebraic Side-channel Analysis in the Presence of Errors [A]//CHES 2010 [C]. LNCS 6225,2010: 428-442.
  • 7Bogdanov A,Knudsen L R, Leander, et al. PRESENT: anultra lightweight block cipher[A]//CHES 2007[C]. Vienna, Austria, 2007:450-466.
  • 8Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equmions [A]//Asiacrypt 2002 [C]. LNCS 2501,2002 : 267-287.
  • 9Courtois N T, Klimov A, Patarin J. Efficient Algorithms for Sol ving Overdefind Systems of Multivariate Polynomial Equattion [EB/EL]. 2000.
  • 10Faugere J C. A New Efficient Algorithm for Computing Grobner Basic(F4) [EB/OL]. http://www, spaces, lip6. fr//@ paper/ F99a. pdf, 1990.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部