检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]军械工程学院计算机工程系,河北石家庄050003
出 处:《华中科技大学学报(自然科学版)》2008年第6期18-21,共4页Journal of Huazhong University of Science and Technology(Natural Science Edition)
基 金:国家自然科学基金资助项目(60571037);国家高技术研究发展计划资助项目(2007AA01Z454)
摘 要:为了证明密码系统运行时功耗泄漏包含系统密码信息,分析了静态互补金属氧化物半导体(CMOS)门数据功耗相关性,通过对AT89C52单片机实现的数据加密标准(DES)密码系统进行差分功耗分析(DPA)攻击,在64 h内获得了DES第16轮加密的48 bit密钥.攻击结果表明:AT89C52中静态CMOS门状态由0到1和由1到0翻转电能消耗不同,静态CMOS门不同位置的负载电容之间存在差异.提出了寄存器负载电容充电功耗模型,解释了攻击现象,明确了DPA攻击的物理基础,为密码系统实施相关防护措施提供了依据.In order to prove that power consumption leakage of a cryptographic system contains the information on the secret key in the system, the data-power consumption correlation of static complementary metal oxide semiconductor (CMOS) gates was analyzed. The paper introduced the differential power analysis (DPA) attacks to the cryptographic system which was realized by AT89C52 microcomputer and encrypted with data encryption standard (DES). 48 bit key of the round 16 of DES was detected in 64 h. In attacks, the results show that the power consumptions of static CMOS gates in AT89C52 switching from 0 to 1 or from 1 to 0 are not equal to each other because of the difference among the different load capacitances in static CMOS gates. The power consumption model of load capacitors charging for registers was introduced to explain the phenomenon of DPA attacks. It makes clear the physical foundation of DPA and can help to find the better way to prevent the cryptographic systems against DPA attacks.
关 键 词:密码系统 差分功耗分析(DPA) 功耗模型 静态互补金属氧化物半导体 数据功耗相关性 数据加密标准(DES)
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28