共查询到18条相似文献,搜索用时 125 毫秒
1.
2.
3.
为了防止智能卡在做加密运算时,旁路信息会通过功耗的变化而泄露,提出了一种抗差分功耗分析攻击的方法.首先研究了AES算法的加密规则,然后采用8位的处理器模拟智能卡,在智能卡上实现了对AES算法中的轮密钥加的差分功耗攻击.为了抵抗轮密钥加的差分功耗攻击,文中在算法级别上提出了一种掩码技术,其核心是用不同的随机量对密码运算过程中明文和密钥进行掩码,实验结果表明,该方法成功地抵抗了差分功耗攻击. 相似文献
4.
5.
针对智能卡采用个人身份码和密码算法双重保护机制,提出一种截断电源式的功耗分析方法,突破个人身份码的输入次数限制,通过穷举搜索获取个人身份码.并利用差分功耗分析技术,在40000个明文样本的情况下,攻击得到原型智能卡中DES密码的密钥. 相似文献
6.
早期的智能卡普遍采用DES(Data Encryption Standard)来进行数据的加/解密,但其安全性已无法满足网上交易和其它一些需要高加密强度的场合.AES即将替代DES成为新的公开的FIPS(Federal Infomation Proces sing Standard,联邦信息处理标准).文中给出一种适合在智能卡上实现该算法的方案. 相似文献
7.
8.
9.
功耗分析攻击是当前密码芯片中各类数据加密算法的主要安全威胁,尤其是对于迄今应用最为广泛的数据加密标准算法造成了严重的危害。通过分析数据加密标准算法遭受功耗分析攻击的原理,并结合针对数据加密标准算法关键防御技术,给出了一种基于互补电路的中间值掩码DES方案设计。主要是利用双电路进行互补输出,以保证寄存器翻转保持功耗恒定,从而最大限度地降低功耗差异。根据算法性能分析结果表明:该方案可以抵抗差分功耗分析攻击,且实现简单,能够直接应用于密码芯片的电路设计中。 相似文献
10.
PFM:一种抗高阶功耗攻击的SMS4算法 总被引:1,自引:0,他引:1
针对已有的SMS4功耗攻击方法,设计了一种适合低功耗小面积的固定值掩码SMS4算法.首先,对SMS4算法结构及内部加密运算流程进行研究;设计了一种SMS4原子掩码算法来抗高阶功耗攻击,该方法使各中间变量均被掩码;在此方法的基础上,为了减少芯片的面积和功耗以适应特殊环境下的加密应用(如特殊环境的传感器加密通信节点),提出了一种改进的固定值掩码算法:伪随机固定值掩码算法(PFM)及其实现技术.实验结果证明,该方法在芯片面积和功耗增加不大的情况下,可以有效抵抗二阶差分功耗攻击. 相似文献
11.
DES算法是最早、最著名的对称密钥加密算法,它是由IBM公司在上个世纪70年代发展起来的。几十年来,DES一直活跃在国际保密通信的舞台上,扮演了十分重要的角色,被广泛应用在ATM、智能卡和USBKey等很多领域。介绍了DES算法产生的背景以及算法流程,并讲述了在TMS320VC33中的实现和优化的问题,并对优化前和优化后的效率进行了比较。 相似文献
12.
Wireless broadcast encryption based on smart cards 总被引:1,自引:0,他引:1
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commercial applications of wireless
broadcasting, such as satellite pay-TV, desire that only those users who have paid for the service can retrieve broadcast
data. This is often achieved by broadcast encryption, which allows a station securely to broadcast data to a dynamically changing
set of privileged users through open air. Most existing broadcast encryption schemes can only revoke a pre-specified number
of users before system re-setup or require high computation, communication and storage overheads in receivers. In this paper,
we propose a new broadcast encryption scheme based on smart cards. In our scheme, smart cards are used to prevent users from
leaking secret keys. Additionally, once an illegally cloned smart card is captured, our scheme also allows tracing of the
compromised smart card by which illegal smart cards are cloned, and can then revoke all cloned smart cards. The new features
of our scheme include minimal computation needs of only a few modular multiplications in the smart card, and the capability
to revoke up to any number of users in one revocation. Furthermore, our scheme is secure against both passive and active attacks
and has better performance than other schemes. 相似文献
13.
介绍了SZX-1智能IC卡税务征收管理系统,该系统采用符合ISO-7816标准的IC卡作为申报信息载体,将纳税申报袁和财务报表等数据存放于IC卡内,解决了税务征收工作中手工处理申报数据的繁琐劳动,大大缩短了申报时间,提高了工作效率。文中对IC卡技术、串行通信、DES加密算法等均作了介绍。 相似文献
14.
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the gen-eral construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure proper-ties and good computational efficiency in storage cost and operation time. 相似文献
15.
16.
SCCⅡ芯片是一款以国产高性能低功耗32位RISC处理器C*Core为基础开发的,具有RSA/DES/ECC等加解密功能的安全芯片。由于该芯片主要应用于信息安全领域,其对于存放于片内Flash的数据安全性有着很高的要求。介绍了一种利用SCCⅡ的MMU模块实现的针对该安全芯片的片内数据保护的方案,它可以广泛应用于USB Key、智能卡、终端加密机等设备上,为芯片提供更高的安全级别。 相似文献
17.
Bae‐Ling Chen Wen‐Chung Kuo Lih‐Chyau Wuu 《International Journal of Communication Systems》2014,27(2):377-389
Smart‐card‐based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu et al. proposed a smart‐card‐based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood et al. and Song discovered that the smart‐card‐based password authentication scheme of Xu et al. is vulnerable to impersonation and internal attacks. They then proposed their respective improved schemes. However, we found that there are still flaws in their schemes: the scheme of Sood et al. does not achieve mutual authentication and the secret key in the login phase of Song's scheme is permanent and thus vulnerable to stolen‐smart‐card and off‐line guessing attacks. In this paper, we will propose an improved and efficient smart‐card‐based password authentication and key agreement scheme. According to our analysis, the proposed scheme not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen‐smart‐card attack. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献