The research of DPA attacks against AES implementations

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:gaolch006
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.
其他文献
Due to their low cost,flexibility,and convenience for long distance data transfer,plastic scintillation fibers (PSF) have been increasingly used in building det
The rate of elapsed polymerization of polyhydroxyethylacrylate in gelatin has been studied to investigate the effect of co-monomers consumption at a given dose.
Digital power supply controller is one of the key parts of SSRF high resolution high stability magnet power supply system.It is very essential to keep any degra
Titanium carbide coatings are widely used as various wear-resistant material.The hydrogen erosion resistance of TiC-C films and the effect of hydrogen participa
An efficient algorithm for facial features extractions is proposed. The facial features we segment are the two eyes, nose and mouth. The algorithm is based on a
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes
The fragmentation process of high-temperature molten drop is a key factor to determine the ratio heat transferred to power in FCIs,which estimates the possible
The indentation method is usefuI in determining the residual stress according to the elastic-plastic properties of materials.So the effect of the residual stres