密码系统差分功耗分析攻击及功耗模型  被引量:8

Differential power analysis attack and power consumption model for cryptographic system

在线阅读下载全文

作  者:褚杰[1] 赵强[1] 丁国良[1] 邓高明[1] 

机构地区:[1]军械工程学院计算机工程系,河北石家庄050003

出  处:《华中科技大学学报(自然科学版)》2008年第6期18-21,共4页Journal of Huazhong University of Science and Technology(Natural Science Edition)

基  金:国家自然科学基金资助项目(60571037);国家高技术研究发展计划资助项目(2007AA01Z454)

摘  要:为了证明密码系统运行时功耗泄漏包含系统密码信息,分析了静态互补金属氧化物半导体(CMOS)门数据功耗相关性,通过对AT89C52单片机实现的数据加密标准(DES)密码系统进行差分功耗分析(DPA)攻击,在64 h内获得了DES第16轮加密的48 bit密钥.攻击结果表明:AT89C52中静态CMOS门状态由0到1和由1到0翻转电能消耗不同,静态CMOS门不同位置的负载电容之间存在差异.提出了寄存器负载电容充电功耗模型,解释了攻击现象,明确了DPA攻击的物理基础,为密码系统实施相关防护措施提供了依据.In order to prove that power consumption leakage of a cryptographic system contains the information on the secret key in the system, the data-power consumption correlation of static complementary metal oxide semiconductor (CMOS) gates was analyzed. The paper introduced the differential power analysis (DPA) attacks to the cryptographic system which was realized by AT89C52 microcomputer and encrypted with data encryption standard (DES). 48 bit key of the round 16 of DES was detected in 64 h. In attacks, the results show that the power consumptions of static CMOS gates in AT89C52 switching from 0 to 1 or from 1 to 0 are not equal to each other because of the difference among the different load capacitances in static CMOS gates. The power consumption model of load capacitors charging for registers was introduced to explain the phenomenon of DPA attacks. It makes clear the physical foundation of DPA and can help to find the better way to prevent the cryptographic systems against DPA attacks.

关 键 词:密码系统 差分功耗分析(DPA) 功耗模型 静态互补金属氧化物半导体 数据功耗相关性 数据加密标准(DES) 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象