期刊文献+

一种抗能量分析攻击的复合寄存器系统 被引量:4

A Compound Register System against Power Analysis Attack
在线阅读 下载PDF
导出
摘要 能量分析攻击是最常见、最成熟的一种侧信道分析技术,对密码算法硬件实现以及多种密码芯片产品产生巨大的威胁.在针对密码算法硬件实现的能量分析攻击中,主要的攻击目标是寄存器,对寄存器进行差分能量分析(Differential Power Analysis,DPA)是最普遍的一类攻击方式.双轨预充电逻辑(Dual-rail Precharge Logic,DPL)作为隐藏技术中的代表方案,是一类抵抗能量分析攻击的有效方法,但使用DPL结构会使密码芯片面积加倍,同时吞吐率也会降低一半.针对这些缺陷,本文提出了一种复合寄存器系统的设计方案.该方案针对硬件电路中能量消耗最大的寄存器部分进行重点防护,使整个复合寄存器系统在每一时钟周期内的总汉明重量与总汉明距离值保持恒定.该方案在保持密码芯片吞吐率基本不变的同时,对寄存器进行了有效的抗能量分析保护.实验表明,在本文提出的复合寄存器方案保护下,10万条能量曲线也无法恢复出真实密钥,相比于无保护寄存器260条即可恢复出真实密钥的情况,有效提高了密码算法实现的安全性. Power Analysis is one of the most common and mature techniques in side channel analysis, which brings huge threats to hardware implementations of cryptographic algorithms and various Cipher Chips. In Power Analysis field focusing on the hardware implementation of the cryptographic algorithms, registers are the main attacking targets. Differential Power Analysis(DPA) aiming at registers is one of the most popular analysis. However, Dual-rail Precharge Logic(DPL), as the representative in hiding techniques, is an effective countermeasure against DPA, but with the cost of doubling the chip area and meanwhile halving the data throughput rate. To overcome these drawbacks, we propose a scheme of compound register system. The scheme focuses on registers which have the highest power consumption and makes countermeasure by utilizing the additional registers to compensate the hamming weight and hamming distance value of the originally working register, making both of the values constants in every clock cycle. The scheme has the ability to protect the originally working register while holding the rate of data throughput. Our evaluation experiment shows that, it's impossible to recover the secret key with more than one hundred thousand traces by using our compound register system, while roughly 260 power traces are enough to compromise the unprotected register scheme. Thus, the proposed system effectively improves the security of the implementation of the cryptographic algorithm.
出处 《密码学报》 2014年第5期411-421,共11页 Journal of Cryptologic Research
基金 国家重点基础研究发展项目(973计划)(2013CB338001)
关键词 差分能量分析 双轨预充电逻辑 复合寄存器系统 Differential Power Analysis Dual-rail Precharge Logic compound register system
  • 相关文献

同被引文献37

  • 1金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 2StefanM,ElisabethO,ThomasP.能量分析攻击[M].北京:科学出版社,2010.
  • 3DINUR I, SHAMIR A. Breaking grain-12g with dynamic cube attacks [ C ] fJ Fast Software Encryption. Berlin: Springer, 2011 : 167-187.
  • 4DING L, GUAN J. Related key chosen IV attack on grain- 128a stream cipher[ J]. IEEE Transactions on Information Forensics and Security, 2013, 8 (5) : 803-809.
  • 5BANIK S, MAITRA S, SARKAR S, et al. A chosen IV related key attack on grain-128a[ C] if Information Security and Privacy. Berlin: Springer, 2013 : 13-26,.
  • 6DATTA P, ROY D, MUKHOPADHYAY S. A probabilistic algebraic attack on the grain family of stream ciphers [ C ] ff Network and System Security. Berlin: Springer International Publishing, 2014: 558-565.
  • 7LEHMANN M, MEIER W. Conditional differential cryptanalysis of grain-128a [ C ] Jj Cryptology and Network Security. Berlin: Springer, 2012: 1-11.
  • 8BANIK S. Some insights into differential cryptanalysis of grain vl [ C ] ff Information Security and Privacy. Wollongong: Springer International Publishing, 2014 : 34- 49.
  • 9ZHANG B, LI Z Q, FENG D G, et al. Near collision attack on the grain vl stream cipher [ C ] ff Fast SoftwareEncryption. Berlin: Springer, 2013: 518-538.
  • 10KARMAKAR S, CHOWDHURY D R. Fault analysis of grain-128 by targeting NFSR[ C ] ff Progress in Cryptology o AFRICACRYPT 2011. Berlin: Springer, 2011 : 298-315.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部