期刊文献+

智能卡SPA&DPA攻击 被引量:3

Smart Card SPA&DPA Attack Introduction
在线阅读 下载PDF
导出
摘要 智能卡是一种可防止被入侵设计的设备,为了防止攻击者藉由边际信道泄漏信息,如功率消耗、执行时间、故障时的输出与输入行为、电磁辐射、功率尖峰情形等信息攻击智能卡,必须采取一些防备措施。本文主要介绍攻击智能卡的简易功率分析(SPA),微分功率分析(DPA)。这些技术已被广泛地使用于窃取智能卡保护数据的技术上,提供这些技术的概略性观念,使我们知道问题所在,进一步想出对策,促使我们设计出更安全的智能卡。 The smart card is a kind of equipment that can prevent from attacking,in order to prevent from side -channel attacking, such as power consumption, execution time, breakdown output and input behavior, electromagnetic radiation and power peak situation. So it must take some protection measures. This paper introduces attacks about Simple Power Analysis (SPA) and Differential Power Analysis (DPA).These technologies have been widely used in steal the smart card protection data in the technology. This paper introduces the idea of these technology,causes us to know the question ,further finds out the countermeasure, urges us to design the safe smart card.
作者 赖坤锋
出处 《现代电子技术》 2005年第17期28-29,34,共3页 Modern Electronics Technique
关键词 DES RSA 简易功率分析(SPA) 微分功率分析(DPA) DES RSA Simple Power Analysis (SPA); Differential Power Analysis (DPA)
作者简介 赖坤锋 男,1975出生,助工。
  • 相关文献

参考文献4

  • 1Kocher P, Jaffe J, Jun B. Introduction to Differential Power Analysis and Related Attacks. http:∥www.cryptography. com/dpa/technical/, 1998.
  • 2Kocher P, Jaffe J, Jun B. Differential Power Analysis,Proceedings of CRYPTO '99 [A] .Wiener M J. Lecture Notes in Computer Science, vol.1666,Springer -Verlag, 1999.
  • 3FIPS 46 -3. Data Encryption Standard. Federal Information Processing Standard, National Institute of Standards and Technology, 1999.
  • 4James Alexander Muir. Techniques of Side Channel Cryptanalysis [D] . Master Thesis, Department of Mathematics, University of Waterloo, Canada, 2001.

同被引文献24

  • 1谢满德,沈海斌,竺红卫.对智能卡进行微分功耗分析攻击的方法研究[J].微电子学,2004,34(6):609-613. 被引量:3
  • 2周开民,陈开颜,赵强,褚杰,张鹏.DPA方法对加密系统的FPGA旁路攻击研究[J].军械工程学院学报,2006,18(2):51-54. 被引量:6
  • 3毛丰江,温希东.智能卡攻击技术与安全策略的研究[J].计算机工程与设计,2006,27(13):2396-2399. 被引量:7
  • 4Messerges T S, Dabbish E A, Sloan R H. Investigations of Power Analysis Attacks on Smart Cards[A]. Proceeding of USENIX Workshop on Smartcard Technology [C]. 1999: 151 -161.
  • 5Messerges T. Using Second Order Power Analysis to Attack DPA Resistant Software[A]. Cryptographic Hardware and Embedded Systems[C]. Springer - Verlag, 2000 : 238 - 251.
  • 6Sibley E H. Random Number Generators: Good OnesAre Hard to Find[J]. Communications of the ACM, 1998, 31 (10) :1192 - 1201.
  • 7FIPS PUB 46 - 3, Data Encryption Standard, Federal Information Processing Standards Publication Reaffirmed 1999 October 25,U. S. Department of Commerce/National Institute of Standards and Technology.
  • 8FIPS PUB 197, Advaced Encryption Stand- ard (AES), Federal Information Processing Standards Publication Reaffirmed Nove- tuber 26,2001, U. S. Department of Commerce/National Institute of Standards and Technology.
  • 9Rivest R L, Shamir A, Adelman L M. A Method for Obtaining Digital Signatures and Public - key Crypto Systems[J].Communications of the ACM, 1978,21 : 120 - 126.
  • 10Kaushik Roy,Sharat Prasad.Low Power CMOS VL SI Circuit Design[M].New York:A Wiley Interscience Publication,2000.5-43.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部