The research of DPA attacks against AES implementations

来源 :The Journal of China Universities of Posts and Telecommunica | 被引量 : 0次 | 上传用户:karrou
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations. This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuits are proposed to implement the advance encryption standard (AES). -based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation Compared with the original power attacks to the maximal probability. Compared with the original power attacks to resist power attacks. Compared with the original power attacks to resist power attacks. Compared with the original power attacks , our improved DPA performs a successful attack on AES hardware implement ations with acceptable power measurements and fewer computations.
其他文献
本文对热水盘管空调系统工程概况进行介绍,简述了设计参数、设备选型及新联动控制机构的相关内容,分析了热水盘管空调的优点,并就热水盘管系统空调室内、外机安装的情况进行了说
世博轴及地下综合体工程空调设计中采用了很多节能环保技术,它们并非来自刻意追求,多为实际需求和因地制宜。本文介绍了江水源地源热泵系统节能技术、高压喷雾降温节能技术、自
虽然心脏康复治疗是一门新兴的学科,但是已经显示出蓬勃的生命力,现有证据表明冠心病康复治疗可以降低心肌梗死患者猝死率和死亡率,同时也可提高生活质量,因而具有良好的价格
睡眠是一个对认知及生存所必需的生物学过程,对人的生理、心理以及社会行为都会产生重要影响,但睡眠的确切机制目前仍不十分清楚。近些年来,神经肽的研究始终是神经科学领域的热
目的:观察老年学习记忆减退食蟹猴海马结构突触素表达的变化。 方法:八只雌性食蟹猴,分为青年和老年两组,用延迟反应实验测试两组食蟹猴的空间学习记忆能力,用免疫组织化学技术
会议
目的:观察慢性束缚应激下小鼠脾脏病理改变及天冬氨酸特异性半胱氨酸蛋白酶-3(Caspase-3)的活性,探讨应激对小鼠免疫器官的损害作用及途径。方法:建立慢性束缚应激模型,8小时
会议
目的:分析戒烟门诊首次就诊后吸烟者采取戒烟行动的影响因素及探讨改进治疗方法。 方法:采用自设电话随访问卷的调查方法,对于2006年8月31日至2008年5月31日来广州市第十二
会议
血管性痴呆(vascular dementia, VD)是由各种脑血管病引起的以记忆、认知功能缺损为主的获得性智能损害综合征。本文应用原位杂交方法检测了VD小鼠海马JNK mRNA变化情况,并探
从最初的纸-笔测试到今天由计算机辅助测试,神经行为测试评价技术(Neurobehavioral Test Evaluation Technique)已经走过了约半个多世纪。本文介绍了神经行为的基本概念及其功
杏仁体(amygdaloid complex)是调节情绪的最重要的脑区之一,并且参与多种认知功能欺骗是一高级的认知活动,在“获益”动机及逃避惩罚双重条件下可引发心理冲突,并产生期待、恐惧