共查询到20条相似文献,搜索用时 63 毫秒
1.
通过对FPGA实现的分组密码SM4进行实际攻击,发现了SM4的线性部件使其具有抗差分功耗攻击的能力,研究并归纳了一般分组密码中线性部件的结构特性和其抗功耗攻击能力的关系,从而提出了一种针对分组密码的算法设计层面的功耗攻击防护措施.完成了对硬件实现的国密SM4算法的成功的DPA攻击. 相似文献
2.
积分攻击是由Daemen等人(doi: 10.1007/BFb0052343)于1997年提出的一种密码分析方法,是继差分分析和线性分析之后最有效的密码分析方法之一。作为2018年全国密码算法设计竞赛分组算法的获胜算法,uBlock抵抗积分攻击的能力受到较多的关注。为了重新评估uBlock家族密码算法抵抗积分攻击的安全性,该文利用单项式传播技术,结合混合整数线性规划(MILP)工具搜索积分区分器,并利用部分和技术进行密钥恢复攻击。对于uBlock-128/128和uBlock-128/256,基于搜索到的9轮积分区分器分别进行了首个11轮和12轮攻击,数据复杂度为$ {2}^{127} $选择明文,时间复杂度分别为$ {2}^{127.06} $和$ {2}^{224} $次加密,存储复杂度分别为$ {2}^{44.58} $和 $ {2}^{138} $字节;对于uBlock-256/256,基于搜索到的10轮积分区分器进行了首个12轮攻击,数据复杂度为$ {2}^{253} $选择明文,时间复杂度为$ {2}^{253.06} $次加密,存储复杂度为$ {2}^{44.46} $字节。与之前uBlock的最优积分攻击结果相比,uBlock-128/128和uBlock-256/256的攻击轮数分别提高2轮,uBlock-128/256的攻击轮数提高3轮。本文的攻击说明,uBlock针对积分攻击依然有足够的安全冗余。 相似文献
3.
Lattice算法是应用于第二代短波自动链路建立协议中对敏感数据进行加解密的分组密码算法.在深入分析Lattice算法的基础上,提供了一种对8轮Lattice算法进行滑动攻击的方法.首先,阐述滑动攻击的基本原理;其次,描述对Lattice算法进行滑动攻击的详细过程,提出了对应的攻击算法;最后,通过计算机仿真给出了对La... 相似文献
4.
5.
目前,分组密码算法面临的主要攻击是穷尽攻击,差分攻击和线性攻击,利用可变长密钥,可变长分组,可变圈数,基于伪随机数据控制的循环移位和模2^32加法群运算等方法,使RC5有效地提高了其抵御上述三类攻击的能力。本文描述并分析了RC5算法及其安全特性。 相似文献
6.
7.
对轻量级分组密码TWIS的安全性做进一步分析,将三子集中间相遇攻击应用于忽略后期白化过程的10轮TWIS。基于TWIS密钥生成策略中存在的缺陷,即其实际密钥长度仅为62 bit且初始密钥混淆速度慢,攻击恢复10轮TWIS全部62 bit密钥的计算复杂度为245,数据复杂度达到最低,仅为一个已知明密文对。分析结果表明TWIS在三子集中间相遇攻击下是不安全的。 相似文献
8.
混沌系统具有良好的伪随机性、混频特性、对初始状态的敏感性和复杂的映射参数等特性,这些特性与密码学要求的产生伪随机信号、混乱和扩散、加、解密密钥的难以预测等属性是十分吻合的。近些年来,不少学者提出了多种基于混沌理论的密码算法,但对其安全性并没有详尽的分析。针对一种较新的基于Feistel结构的混沌分组密码,应用不可能差分的分析方法,在固定S盒的情况下对其安全性进行了分析,并在动态S盒的情况下说明了其安全性所在。 相似文献
9.
11.
12.
近年来涌现出许多抗功耗分析的方法,例如双轨电路法、掩码法和随机操作插入法。仔细分析这些方法可以发现它们都有潜在的缺陷,这些缺陷使得这些方法大都受制于大量的数据统计(包括高阶数据统计)。提出了一种在分组密码加解密过程中加入伪轮函数的方法。伪轮函数的加入使得加解密过程具有不可重复性,从而给功耗分析带来很大的麻烦。用51单片机仿真了这个设计,并进行了相关的功耗分析,结果显示该设计能很好地抵制功耗分析。 相似文献
13.
通常,SRAM的后备电池客量较小,它们的待机工作电流(芯片使能“禁止”)一般也很小,几个μA至几十个μA之间,实际要求在系统断电后,后备电池能够工作的时间越长越好,以保证长期保持SRAM的内容。这样,设计一个工作电流极小的SRAM保护电路,就显得尤其重要。一般常用SRAM掉电保护电路,如高性能的MAX691A,典型工作电流仅30μA。但是,就SRAM而言,具有更低功耗的掉电保护电路才是至关重要的。 相似文献
14.
The first known cryptanalysis of the full 32 rounds of Skipjack, a symmetric-key block cipher, is presented. By exploiting its periodic key schedule, a complementation slide attack is mounted, requiring only 2 32.5 known texts and 244 encryptions. This result shows the importance of putting more emphasis on key schedule design 相似文献
15.
《Electron Devices, IEEE Transactions on》1978,25(4):491-492
The dependence of the resistance associated with the equivalent circuit with gate protection on the electrical breakdown voltage was analyzed in terms of the transient solution of the equivalent circuit. The series resistance for the input voltage and the dynamic resistance in the breakdown region of the protective diode are found to have pronounced effects on the electrical breakdown voltage of the gate oxide, while the distributed resistance has a lesser effect on it. 相似文献
16.
Hao-Ping Hong Jiin-Chuan Wu 《Solid-State Circuits, IEEE Journal of》2001,36(1):152-155
When MOSFET is used as a power switch, it is essential to prevent reverse current flow through the parasitic body diodes under reverse voltage condition. A new built-in reverse voltage protection circuit for MOSFETs has been developed. In this design, an area-efficient circuit is used to automatically select the proper well bias voltage to prevent reverse current under the reverse-voltage condition. This built-in reverse protection circuit has been successfully implemented in a high-side power switch application using a 0.6-μm CMOS process. The die area of the protection circuit is only 2.63% of that of a MOSFET. The latch-up immunity is greater than +12 V and -10 V in voltage triggering mode, and greater than ±500 mA in current triggering mode. The protection circuit is not in series with the MOSFET switch, so that the full output swing and high power efficiency are achieved 相似文献
17.
18.
Junyang Luo Liang Y.C. byung Jin Cho 《Industrial Electronics, IEEE Transactions on》2000,47(4):744-750
Development of a monolithic power integrated circuit by making the lateral insulated gate bipolar transistor (IGBT) the main switching device is a current topic. The overcurrent protection scheme is usually necessary to be built as part of the function in such a power integrated circuit. The protection circuit requires distinguishing various fault conditions and reacting differently based on the device safe operating area (SOA) limitation. At the same time, the protection circuit should also be relatively concise and suitable for integration. In this paper, a concise circuit suitable for integration and with gate drive capability is proposed to provide the complete function of overcurrent SOA protection for the LIGBT. The operational principle was described in detail and the circuit performance was verified with experimental results from both the discrete circuit and the fabricated LIGBT integrated circuit 相似文献
19.
20.
Praveen V. Pol Sanjaykumar L. Patil Sanjeev Kumar Pandey 《International Journal of Electronics》2013,100(12):1864-1884
This paper proposes an overcurrent protection (OCP) circuit for power MOSFETs employed in low voltage power converters. The proposed configuration requires only discrete components with a gate driver IC and uses the voltage drop across the device for overcurrent detection. It can operate independently in cycle-by-cycle shutdown and multiple cycle shutdown modes. In coordination with a micro-controller based driver IC input signal generator and controller, the proposed OCP circuit can also operate in a single cycle latch-up and hiccup OCP modes. The performance of the proposed scheme is evaluated experimentally at both, hard and soft fault conditions. By experimentation, it is shown that the proposed circuit can operate in various protection modes and capable of protecting a MOSFET in both, hard and soft fault conditions. 相似文献