共查询到19条相似文献,搜索用时 125 毫秒
1.
PFM:一种抗高阶功耗攻击的SMS4算法 总被引:1,自引:0,他引:1
针对已有的SMS4功耗攻击方法,设计了一种适合低功耗小面积的固定值掩码SMS4算法.首先,对SMS4算法结构及内部加密运算流程进行研究;设计了一种SMS4原子掩码算法来抗高阶功耗攻击,该方法使各中间变量均被掩码;在此方法的基础上,为了减少芯片的面积和功耗以适应特殊环境下的加密应用(如特殊环境的传感器加密通信节点),提出了一种改进的固定值掩码算法:伪随机固定值掩码算法(PFM)及其实现技术.实验结果证明,该方法在芯片面积和功耗增加不大的情况下,可以有效抵抗二阶差分功耗攻击. 相似文献
2.
3.
4.
为了防止智能卡在做加密运算时,旁路信息会通过功耗的变化而泄露,提出了一种抗差分功耗分析攻击的方法.首先研究了AES算法的加密规则,然后采用8位的处理器模拟智能卡,在智能卡上实现了对AES算法中的轮密钥加的差分功耗攻击.为了抵抗轮密钥加的差分功耗攻击,文中在算法级别上提出了一种掩码技术,其核心是用不同的随机量对密码运算过程中明文和密钥进行掩码,实验结果表明,该方法成功地抵抗了差分功耗攻击. 相似文献
5.
6.
提出了一种基于混沌随机掩码虚拟光学成像系统新颖的图像加密算法,详细描述了利用该方法进行数字图像加密解密的过程.首先,引入了经混沌随机掩码的虚拟光学成像系统模型;然后描述了利用该模型进行图像加密解密的算法.利用混沌系统的特性,提高了算法的安全性.数值仿真实验证明了该方法的有效性,表明该加密算法对参数具有强敏感性. 相似文献
7.
为了提高光学加密技术的抗选择明文攻击能力与未知攻击下的解密质量,该文设计了基于差异混合掩码与混沌Gyrator变换的光学图像加密算法。将输入明文转换成相应的快速响应码;考虑明文特性,根据Logistic映射,生成一个混沌相位掩码;同时,联合径向希尔伯特与波带片相位函数,将其与混沌相位掩码融合,构建了混合相位掩码;随后,利用明文图像迭代Logistic映射所输出的随机序列来计算Gyrator变换的旋转角度,结合混合相位掩码,对快速响应码进行调制,形成Gyrator频谱;引入等量分解技术,将Gyrator频谱分割为两个分量,并设置不同的阶数,形成两个差异螺旋相位掩码;利用奇异值分解(SVD)方法,将其中一个Gyrator频谱分量进行处理,并联合两个差异螺旋相位掩码,分别对其相应的正交矩阵进行编码;最后,通过组合编码后的正交矩阵与对角矩阵,基于可逆SVD技术,输出加密密文。理论分析了所提算法抵抗明文攻击和裁剪攻击的能力,以及加密结果针对密钥变化的敏感性水平。实验结果验证了所提算法拥有良好的安全性能。 相似文献
8.
9.
功耗分析攻击是当前密码芯片中各类数据加密算法的主要安全威胁,尤其是对于迄今应用最为广泛的数据加密标准算法造成了严重的危害。通过分析数据加密标准算法遭受功耗分析攻击的原理,并结合针对数据加密标准算法关键防御技术,给出了一种基于互补电路的中间值掩码DES方案设计。主要是利用双电路进行互补输出,以保证寄存器翻转保持功耗恒定,从而最大限度地降低功耗差异。根据算法性能分析结果表明:该方案可以抵抗差分功耗分析攻击,且实现简单,能够直接应用于密码芯片的电路设计中。 相似文献
10.
11.
12.
13.
研究了RSA密码算法的差分功耗分析防御方法.通过对自随机化模幂算法的分析,提出将BBS随机数发生器和侧信道原子化技术应用于改进的算法中,得到侧信道原子化的严格自随机化模幂算法.仿真实验结果证明.该方法可以有效防御差分功耗分析攻击. 相似文献
14.
The quantum of power consumption in wireless sensor nodes plays a vital role in power management since more number of functional elements are integrated in a smaller space and operated at very high frequencies. In addition, the variations in the power consumption pave the way for power analysis attacks in which the attacker gains control of the secret parameters involved in the cryptographic implementation embedded in the wireless sensor nodes. Hence, a strong countermeasure is required to provide adequate security in these systems. Traditional digital logic gates are used to build the circuits in wireless sensor nodes and the primary reason for its power consumption is the absence of reversibility property in those gates. These irreversible logic gates consume power as heat due to the loss of per bit information. In order to minimize the power consumption and in turn to circumvent the issues related to power analysis attacks, reversible logic gates can be used in wireless sensor nodes. This shifts the focus from power-hungry irreversible gates to potentially powerful circuits based on controllable quantum systems. Reversible logic gates theoretically consume zero power and have accurate quantum circuit model for practical realization such as quantum computers and implementations based on quantum dot cellular automata. One of the key components in wireless sensor nodes is the cryptographic algorithm implementation which is used to secure the information collected by the sensor nodes. In this work, a novel reversible gate design of 128-bit Advanced Encryption Standard (AES) cryptographic algorithm is presented. The complete structure of AES algorithm is designed by using combinational logic circuits and further they are mapped to reversible logic circuits. The proposed architectures make use of Toffoli family of reversible gates. The performance metrics such as gate count and quantum cost of the proposed designs are rigorously analyzed with respect to the existing designs and are properly tabulated. Our proposed reversible design of AES algorithm shows considerable improvements in the performance metrics when compared to existing designs. 相似文献
15.
In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks,a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer,which aimed at increasing the performance of ECC and resisting common power analysis attacks.Experimental results show that compared with the state-of-the-art algorithms,the proposed algorithm decreases 5.71% of point doubling cost,3.17% of point tripling cost,and 8.74% of point quintupling cost under discrete group operations.When the key length is 160 bit,the proposed algorithm decreases 36.32% of point tripling cost,17.42% of point quintupling cost,and 8.70% of the system cost under continuous group operations.The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack. 相似文献
16.
由于无线信道的开放性,当前无线通信系统愈发受到恶意干扰攻击. 为了提高无线通信干扰能力,提出了一种基于智能反射面(intelligent reflecting surface, IRS)的抗干扰通信方法. 针对IRS辅助的通信抗干扰系统,考虑在用户接收信干噪比约束和连续相移约束下,建立非线性、多变量耦合的功率最小化资源分配模型,以实现频谱和能量性能的双向提升. 利用交替优化和半正定松弛求解原变量耦合的非凸优化问题,以得到最优发射波束和IRS相移. 此外,针对模型求解复杂度高的问题,还提出了一种低复杂度算法以得到发射波束的低复杂度闭式解. 同时,进一步提出了一种实用且快速响应的经验算法,以应对时变高动态干扰. 仿真结果表明,与现有未引入IRS方案相比,所提算法在各种情况下收敛迅速,并且功率消耗和干扰容限都有约30 dB的性能提升. 相似文献
17.
In hostile environments, localization often suffers from malicious attacks that may distort transmit power and degrade positioning accuracy significantly for wireless sensor network. A robust semidefinite relaxation secure localiza-tion algorithm RSRSL was proposed to improve the location accuracy against malicious attacks. On the assumption of unknown transmit power, which is undoubtedly approximate to the fact of WSN, a novel secure location probability model was introduced for single-target and multi-target sensor networks, respectively. Taking the computational complexity of RSRSL into account, the nonlinear and non-convex optimization problem was simplified into a semidefinite programming problem. According to the results from both simulations and field experiments, it is clearly demonstrated that the proposed RSRSL has better performance on location accuracy, in contrast to the conventional localization algorithms. 相似文献
18.
Side-channel attacks using static power have been shown to be successful against cryptographic circuits in different environments. This class of attacks exploits the power leakage when the circuit is in a static state, during which the power leakage is expected to be a fixed value. Due to the low signal-to-noise ratio of static power, usually more traces are needed for a static power attack to reach the same success rate as a dynamic power attack. The probabilistic distribution pattern of static power varies significantly in different devices, which further poses challenges to the accurate modeling of static power. In this paper we propose non-parametric template attacks which use a kernel methodology to improve the accuracy of modeling static power consumption. The proposed template attacks are tested using transistor-level simulations of circuits designed with a 45-nm standard cell library. Our test results show that our approach improves the success rate of template attacks using static power in cases where the distribution of static power consumption cannot be accurately modeled by Gaussian models. 相似文献