An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA...An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.展开更多
DPA(Differential Power Analysis)攻击的强度取决于芯片电路功耗与所处理的数据之间的相关性以及攻击者对算法电路实现细节的了解程度.本文结合动态差分逻辑和可配置逻辑的特点,提出了一种具有抗DPA攻击能力的双端输出可配置逻辑(DRCL:...DPA(Differential Power Analysis)攻击的强度取决于芯片电路功耗与所处理的数据之间的相关性以及攻击者对算法电路实现细节的了解程度.本文结合动态差分逻辑和可配置逻辑的特点,提出了一种具有抗DPA攻击能力的双端输出可配置逻辑(DRCL:Dual-Rail Configurable Logic).该逻辑一方面具有与数据取值无关的信号翻转率和信号翻转时刻,因而能够实现很好的功耗恒定特性;另一方面去除了电路结构与电路功能之间的相关性,从而可以阻止攻击者通过版图逆向分析的方法窃取算法电路实现细节.实验结果表明,DRCL比典型的抗DPA攻击逻辑WDDL(Wave Dynamic Differential Logic)具有更好的功耗恒定性,因而具有更强的DPA攻击防护性能.展开更多
功耗攻击利用加密器件泄露的功耗来恢复密钥,对嵌入式密码系统构成严重威胁.CHES 2012中,Fei利用混乱系数对功耗攻击中应用最为广泛的DPA的成功率进行建模.然而其中重要参数混乱系数定义冗余,并且混乱系数的数值计算不准确.本文根据分...功耗攻击利用加密器件泄露的功耗来恢复密钥,对嵌入式密码系统构成严重威胁.CHES 2012中,Fei利用混乱系数对功耗攻击中应用最为广泛的DPA的成功率进行建模.然而其中重要参数混乱系数定义冗余,并且混乱系数的数值计算不准确.本文根据分组算法的一般特性,修改了混乱系数的定义,将其从二维降至一维,这使混乱系数的个数成指数倍下降.我们重新计算了修改后的混乱系数的值,并发现DES算法的混乱系数的分布十分特殊.我们利用修改后的混乱系数重新计算了针对DES进行DPA时各个备选密钥的功耗差(Difference of Means,DoM)期望的分布,并在SASEBO平台上针对时钟频率为24M的3DES算法CPU芯片卡进行了实验攻击,得到的实验结果与利用修改后的混乱系数计算得到的DoM期望值相符合.展开更多
基金supported by the National Natural Science Foundation of China(60373109)Ministry of Science and Technologyof China and the National Commercial Cryptography Application Technology Architecture and Application DemonstrationProject(2008BAA22B02).
文摘An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.
文摘功耗攻击利用加密器件泄露的功耗来恢复密钥,对嵌入式密码系统构成严重威胁.CHES 2012中,Fei利用混乱系数对功耗攻击中应用最为广泛的DPA的成功率进行建模.然而其中重要参数混乱系数定义冗余,并且混乱系数的数值计算不准确.本文根据分组算法的一般特性,修改了混乱系数的定义,将其从二维降至一维,这使混乱系数的个数成指数倍下降.我们重新计算了修改后的混乱系数的值,并发现DES算法的混乱系数的分布十分特殊.我们利用修改后的混乱系数重新计算了针对DES进行DPA时各个备选密钥的功耗差(Difference of Means,DoM)期望的分布,并在SASEBO平台上针对时钟频率为24M的3DES算法CPU芯片卡进行了实验攻击,得到的实验结果与利用修改后的混乱系数计算得到的DoM期望值相符合.