Method Based on Time Randomization to Resist Fault Sensitivity Analysis |
| |
Authors: | Yingjian Yan Jijun Xu Shoucheng Wang Zhong Wang and Min Liu |
| |
Affiliation: | Institute of Information Science and Technology, Zhengzhou 450001, China |
| |
Abstract: | A fault sensitivity analysis (FSA)-resistance model based on time randomization is proposed. The randomization unit is composed of two parts, namely the configurable register array (R-A) and the decoder (chiefly random number generator, RNG). In this way, registers chosen can be either valid or invalid depending on the configuration information generated by the decoder. Thus, the fault sensitivity information can be confusing. Meanwhile, based on this model, a defensive scheme is designed to resist both fault sensitivity analysis (FSA) and differential power analysis (DPA). This scheme is verified with our experiments. |
| |
Keywords: | block cipher time randomization fault sensitivity analysis (FSA) differential power analysis |
本文献已被 CNKI 万方数据 等数据库收录! |
| 点击此处可从《北京理工大学学报(英文版)》浏览原始摘要信息 |
|
点击此处可从《北京理工大学学报(英文版)》下载全文 |