首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
PFM:一种抗高阶功耗攻击的SMS4算法   总被引:1,自引:0,他引:1  
针对已有的SMS4功耗攻击方法,设计了一种适合低功耗小面积的固定值掩码SMS4算法.首先,对SMS4算法结构及内部加密运算流程进行研究;设计了一种SMS4原子掩码算法来抗高阶功耗攻击,该方法使各中间变量均被掩码;在此方法的基础上,为了减少芯片的面积和功耗以适应特殊环境下的加密应用(如特殊环境的传感器加密通信节点),提出了一种改进的固定值掩码算法:伪随机固定值掩码算法(PFM)及其实现技术.实验结果证明,该方法在芯片面积和功耗增加不大的情况下,可以有效抵抗二阶差分功耗攻击.  相似文献   

2.
随着智能卡技术的不断发展,智能卡芯片的安全性也面临越来越大的挑战。在众多加密算法中,数据加密标准(DES)算法是一种应用较广的对称加解密算法。为了抵御各种侧信道攻击,使用最为广泛的是在算法中通过掩码技术来消除真实密钥和功耗相关性,该文提出一种新的适用于DES的循环掩码方案,和之前文献中的预计算掩码方案相比,不仅预计算量大大减少,而且整个DES运算过程的中间数据都是带有掩码的,把掩码拆分后,还可以防护高阶攻击。  相似文献   

3.
差分功耗分析是破解AES密码算法最为有效的一种攻击技术,为了防范这种攻击技术本文基于FPGA搭建实验平台实现了对AES加密算法的DPA攻击,在此基础上通过掩码技术对AES加密算法进行优化与改进。通过实验证明改进后的AES算法能有效的防范DPA的攻击。  相似文献   

4.
为了防止智能卡在做加密运算时,旁路信息会通过功耗的变化而泄露,提出了一种抗差分功耗分析攻击的方法.首先研究了AES算法的加密规则,然后采用8位的处理器模拟智能卡,在智能卡上实现了对AES算法中的轮密钥加的差分功耗攻击.为了抵抗轮密钥加的差分功耗攻击,文中在算法级别上提出了一种掩码技术,其核心是用不同的随机量对密码运算过程中明文和密钥进行掩码,实验结果表明,该方法成功地抵抗了差分功耗攻击.  相似文献   

5.
FPGA密码芯片改进掩码防护方法研究   总被引:1,自引:0,他引:1  
功耗攻击已对密码芯片物理安全性构成严峻威胁,对其攻击和防御的研究是密码旁路分析的热点问题。文中给出了一种DES伪随机掩码算法的设计和实现方法,分析了算法抗功耗攻击的安全性。结果表明:一般的DES伪随机掩码算法只能抵抗一阶差分功耗攻击,不能有效防御二阶差分功耗攻击。为抵御二阶DPA攻击,采用掩码方法对DES掩码算法结构进行了改进,在理论上具有抗DPA攻击的能力。  相似文献   

6.
提出了一种基于混沌随机掩码虚拟光学成像系统新颖的图像加密算法,详细描述了利用该方法进行数字图像加密解密的过程.首先,引入了经混沌随机掩码的虚拟光学成像系统模型;然后描述了利用该模型进行图像加密解密的算法.利用混沌系统的特性,提高了算法的安全性.数值仿真实验证明了该方法的有效性,表明该加密算法对参数具有强敏感性.  相似文献   

7.
为了提高光学加密技术的抗选择明文攻击能力与未知攻击下的解密质量,该文设计了基于差异混合掩码与混沌Gyrator变换的光学图像加密算法。将输入明文转换成相应的快速响应码;考虑明文特性,根据Logistic映射,生成一个混沌相位掩码;同时,联合径向希尔伯特与波带片相位函数,将其与混沌相位掩码融合,构建了混合相位掩码;随后,利用明文图像迭代Logistic映射所输出的随机序列来计算Gyrator变换的旋转角度,结合混合相位掩码,对快速响应码进行调制,形成Gyrator频谱;引入等量分解技术,将Gyrator频谱分割为两个分量,并设置不同的阶数,形成两个差异螺旋相位掩码;利用奇异值分解(SVD)方法,将其中一个Gyrator频谱分量进行处理,并联合两个差异螺旋相位掩码,分别对其相应的正交矩阵进行编码;最后,通过组合编码后的正交矩阵与对角矩阵,基于可逆SVD技术,输出加密密文。理论分析了所提算法抵抗明文攻击和裁剪攻击的能力,以及加密结果针对密钥变化的敏感性水平。实验结果验证了所提算法拥有良好的安全性能。  相似文献   

8.
该文分析了塔域的运算特性,提出了基于塔域分解的非线性变换实现方法,设计了求逆运算的随机掩码方案,利用循环移位对随机掩码进行移位变换,形成了基于塔域的循环移位随机掩码方案,实现了所有中间值的随机化隐藏,提高了算法的抗能量攻击能力.该文在高级加密标准(AES)算法上进行验证,利用T-test和相关性分析对掩码方案进行安全性评估.该掩码方案无明显信息泄露点,可有效抵抗相关性攻击,另外较现有文献的掩码方案,资源开销更小,通用性更好.  相似文献   

9.
功耗分析攻击是当前密码芯片中各类数据加密算法的主要安全威胁,尤其是对于迄今应用最为广泛的数据加密标准算法造成了严重的危害。通过分析数据加密标准算法遭受功耗分析攻击的原理,并结合针对数据加密标准算法关键防御技术,给出了一种基于互补电路的中间值掩码DES方案设计。主要是利用双电路进行互补输出,以保证寄存器翻转保持功耗恒定,从而最大限度地降低功耗差异。根据算法性能分析结果表明:该方案可以抵抗差分功耗分析攻击,且实现简单,能够直接应用于密码芯片的电路设计中。  相似文献   

10.
《信息技术》2015,(12):38-41
旁路攻击是一种利用密码设备在运行时泄露的旁路信息对其进行攻击的一种方法。Paul Kocher等人在1998年提出的功耗分析,是目前使用最广泛的一种旁路攻击方法。掩码技术通过对密码设备所处理的中间值进行随机化,来消除设备功耗与数据之间的相关性,从而达到防护的目的。文中提出了一种抗二阶功耗分析的DES算法掩码实现方案,增强了防护的效果并在之后的一个实验中,验证了方案的有效性。  相似文献   

11.
该文分析了塔域的运算特性,提出了基于塔域分解的非线性变换实现方法,设计了求逆运算的随机掩码方案,利用循环移位对随机掩码进行移位变换,形成了基于塔域的循环移位随机掩码方案,实现了所有中间值的随机化隐藏,提高了算法的抗能量攻击能力。该文在高级加密标准(AES)算法上进行验证,利用T-test和相关性分析对掩码方案进行安全性评估。该掩码方案无明显信息泄露点,可有效抵抗相关性攻击,另外较现有文献的掩码方案,资源开销更小,通用性更好。  相似文献   

12.
对智能卡进行微分功耗分析攻击的方法研究   总被引:3,自引:0,他引:3  
详细阐述了对通用密码系统实施微分功耗分析攻击(DPA)的理论基础和对DES算法攻击的特定理论,并提出了对DPA的改进算法。在分析功耗信号的噪声特点以后,提出了一个信噪比(SNR)的建模方法和相应理论的证明。最后,给出了算法的一个实验结果。  相似文献   

13.
研究了RSA密码算法的差分功耗分析防御方法.通过对自随机化模幂算法的分析,提出将BBS随机数发生器和侧信道原子化技术应用于改进的算法中,得到侧信道原子化的严格自随机化模幂算法.仿真实验结果证明.该方法可以有效防御差分功耗分析攻击.  相似文献   

14.
The quantum of power consumption in wireless sensor nodes plays a vital role in power management since more number of functional elements are integrated in a smaller space and operated at very high frequencies. In addition, the variations in the power consumption pave the way for power analysis attacks in which the attacker gains control of the secret parameters involved in the cryptographic implementation embedded in the wireless sensor nodes. Hence, a strong countermeasure is required to provide adequate security in these systems. Traditional digital logic gates are used to build the circuits in wireless sensor nodes and the primary reason for its power consumption is the absence of reversibility property in those gates. These irreversible logic gates consume power as heat due to the loss of per bit information. In order to minimize the power consumption and in turn to circumvent the issues related to power analysis attacks, reversible logic gates can be used in wireless sensor nodes. This shifts the focus from power-hungry irreversible gates to potentially powerful circuits based on controllable quantum systems. Reversible logic gates theoretically consume zero power and have accurate quantum circuit model for practical realization such as quantum computers and implementations based on quantum dot cellular automata. One of the key components in wireless sensor nodes is the cryptographic algorithm implementation which is used to secure the information collected by the sensor nodes. In this work, a novel reversible gate design of 128-bit Advanced Encryption Standard (AES) cryptographic algorithm is presented. The complete structure of AES algorithm is designed by using combinational logic circuits and further they are mapped to reversible logic circuits. The proposed architectures make use of Toffoli family of reversible gates. The performance metrics such as gate count and quantum cost of the proposed designs are rigorously analyzed with respect to the existing designs and are properly tabulated. Our proposed reversible design of AES algorithm shows considerable improvements in the performance metrics when compared to existing designs.  相似文献   

15.
Ming XU  Liang SHI 《通信学报》2018,39(5):74-84
In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks,a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer,which aimed at increasing the performance of ECC and resisting common power analysis attacks.Experimental results show that compared with the state-of-the-art algorithms,the proposed algorithm decreases 5.71% of point doubling cost,3.17% of point tripling cost,and 8.74% of point quintupling cost under discrete group operations.When the key length is 160 bit,the proposed algorithm decreases 36.32% of point tripling cost,17.42% of point quintupling cost,and 8.70% of the system cost under continuous group operations.The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack.  相似文献   

16.
由于无线信道的开放性,当前无线通信系统愈发受到恶意干扰攻击. 为了提高无线通信干扰能力,提出了一种基于智能反射面(intelligent reflecting surface, IRS)的抗干扰通信方法. 针对IRS辅助的通信抗干扰系统,考虑在用户接收信干噪比约束和连续相移约束下,建立非线性、多变量耦合的功率最小化资源分配模型,以实现频谱和能量性能的双向提升. 利用交替优化和半正定松弛求解原变量耦合的非凸优化问题,以得到最优发射波束和IRS相移. 此外,针对模型求解复杂度高的问题,还提出了一种低复杂度算法以得到发射波束的低复杂度闭式解. 同时,进一步提出了一种实用且快速响应的经验算法,以应对时变高动态干扰. 仿真结果表明,与现有未引入IRS方案相比,所提算法在各种情况下收敛迅速,并且功率消耗和干扰容限都有约30 dB的性能提升.  相似文献   

17.
In hostile environments, localization often suffers from malicious attacks that may distort transmit power and degrade positioning accuracy significantly for wireless sensor network. A robust semidefinite relaxation secure localiza-tion algorithm RSRSL was proposed to improve the location accuracy against malicious attacks. On the assumption of unknown transmit power, which is undoubtedly approximate to the fact of WSN, a novel secure location probability model was introduced for single-target and multi-target sensor networks, respectively. Taking the computational complexity of RSRSL into account, the nonlinear and non-convex optimization problem was simplified into a semidefinite programming problem. According to the results from both simulations and field experiments, it is clearly demonstrated that the proposed RSRSL has better performance on location accuracy, in contrast to the conventional localization algorithms.  相似文献   

18.
Side-channel attacks using static power have been shown to be successful against cryptographic circuits in different environments. This class of attacks exploits the power leakage when the circuit is in a static state, during which the power leakage is expected to be a fixed value. Due to the low signal-to-noise ratio of static power, usually more traces are needed for a static power attack to reach the same success rate as a dynamic power attack. The probabilistic distribution pattern of static power varies significantly in different devices, which further poses challenges to the accurate modeling of static power. In this paper we propose non-parametric template attacks which use a kernel methodology to improve the accuracy of modeling static power consumption. The proposed template attacks are tested using transistor-level simulations of circuits designed with a 45-nm standard cell library. Our test results show that our approach improves the success rate of template attacks using static power in cases where the distribution of static power consumption cannot be accurately modeled by Gaussian models.  相似文献   

19.
孙鹏  吴庆 《通信技术》2015,48(4):478-483
针对RDDoS攻击溯源问题,在包标记技术的基础上,提出了一种自适应的标记算法。通过动态调整标记概率,较好地解决了算法收敛速度和路由器负载问题,并针对传统包标记算法只能对DDoS攻击进行溯源的问题,设计了一种反射标记算法,使包标记技术能应用于RDDoS攻击溯源,最后对算法进行了理论分析及模拟研究,通过与经典包标记算法和动态包标记算法进行对比,验证了其良好的性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号