检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《电子与信息学报》2012年第11期2774-2784,共11页Journal of Electronics & Information Technology
基 金:国家自然科学基金(61274132;61076032);教育部博士点基金(20113305110005);优秀博士学位论文培育基金(PY20100003)资助课题
摘 要:差分功耗分析(DPA)攻击依赖于密码芯片在执行加密/解密过程中功耗与数据及指令的相关性,利用统计学等方法对收集到的功耗曲线进行分析,盗取关键信息,对密码芯片的安全性构成极大威胁。防御DPA攻击技术的开发与研究,已经成为信息安全领域的迫切需求。该文在归纳DPA攻击原理的基础上,对主流防御DPA攻击技术的理论与设计方法进行概述与分析,指出防御DPA前沿技术的研究进展。重点讨论防御DPA攻击技术的原理、算法流程和电路实现,包括随机掩码技术、功耗隐藏技术、功耗扰乱技术等等,并详细分析这些技术存在的优缺点。最后,对该领域潜在的研究方向与研究热点进行探讨。Differential Power Analysis (DPA) attacks exploit the data or instruction dependency of the power consumption of the cryptographic devices during encryption/decryption process. A large number of power traces are used to analyze the cipher key information on mathematics statistical methods. DPA attacks have been becoming a great threat to cipher security. In order to systematically and comprehensively understand DPA countermeasures, and actively promote the studying of high performance cryptographic chip, this paper introduces the basic principle of DPA, explains and analyzes the mainstream DPA countermeasures, and points out the advanced topics countermeasures. This paper focuses on the theory of DPA countermeasures, the flow path of algorithm, and the implementation of circuits, including masking technology, hiding technology, power disruption technology and so on. The advantages and disadvantages of these countermeasures are detailed discussed. Finally, the potential research directions and advanced topics on DPA countermeasures are provided.
关 键 词:信息安全 密码芯片 差分功耗分析(DPA)攻击 防御技术
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:13.59.210.36