首页 | 本学科首页   官方微博 | 高级检索  
     

防御差分功耗分析攻击技术研究
引用本文:汪鹏君, 张跃军, 张学龙. 防御差分功耗分析攻击技术研究[J]. 电子与信息学报, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
作者姓名:汪鹏君*  张跃军  张学龙
作者单位:宁波大学电路与系统研究所 宁波 315211
基金项目:国家自然科学基金(61274132,61076032);教育部博士点基金(20113305110005);优秀博士学位论文培育基金(PY20100003)资助课题
摘    要:差分功耗分析(DPA)攻击依赖于密码芯片在执行加密/解密过程中功耗与数据及指令的相关性,利用统计学等方法对收集到的功耗曲线进行分析,盗取关键信息,对密码芯片的安全性构成极大威胁。防御DPA攻击技术的开发与研究,已经成为信息安全领域的迫切需求。该文在归纳DPA攻击原理的基础上,对主流防御DPA攻击技术的理论与设计方法进行概述与分析,指出防御DPA前沿技术的研究进展。重点讨论防御DPA攻击技术的原理、算法流程和电路实现,包括随机掩码技术、功耗隐藏技术、功耗扰乱技术等等,并详细分析这些技术存在的优缺点。最后,对该领域潜在的研究方向与研究热点进行探讨。

关 键 词:信息安全   密码芯片   差分功耗分析(DPA)攻击   防御技术
收稿时间:2012-05-11
修稿时间:2012-09-03

Research of Differential Power Analysis Countermeasures
Wang Peng-Jun, Zhang Yue-Jun, Zhang Xue-Long. Research of Differential Power Analysis Countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555
Authors:Wang Peng-jun Zhang Yue-jun Zhang Xue-long
Affiliation:Wang Peng-jun Zhang Yue-jun Zhang Xue-long(Institute of Circuits and Systems,Ningbo University,Ningbo 315211,China)
Abstract:Differential Power Analysis (DPA) attacks exploit the data or instruction dependency of the power consumption of the cryptographic devices during encryption/decryption process. A large number of power traces are used to analyze the cipher key information on mathematics statistical methods. DPA attacks have been becoming a great threat to cipher security. In order to systematically and comprehensively understand DPA countermeasures, and actively promote the studying of high performance cryptographic chip, this paper introduces the basic principle of DPA, explains and analyzes the mainstream DPA countermeasures, and points out the advanced topics countermeasures. This paper focuses on the theory of DPA countermeasures, the flow path of algorithm, and the implementation of circuits, including masking technology, hiding technology, power disruption technology and so on. The advantages and disadvantages of these countermeasures are detailed discussed. Finally, the potential research directions and advanced topics on DPA countermeasures are provided.
Keywords:Information security  Cryptography  Differential Power Analysis (DPA)  Countermeasures
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号