首页 | 官方网站   微博 | 高级检索  
     

嵌入式加密芯片功耗分析攻击与防御研究进展
引用本文:李浪,李仁发,童元满,章竞竞,Edwin H-M Sha.嵌入式加密芯片功耗分析攻击与防御研究进展[J].计算机研究与发展,2010,47(4).
作者姓名:李浪  李仁发  童元满  章竞竞  Edwin H-M Sha
作者单位:1. 湖南大学计算机与通信学院,长沙,410082;衡阳师范学院计算机系,湖南衡阳,421008
2. 湖南大学计算机与通信学院,长沙,410082
3. 国防科学技术大学计算机学院,长沙,410073
4. 湖南大学计算机与通信学院,长沙,410082;美国德州大学达拉斯分校计算机系,理查森,75083
基金项目:国家“八六三”高技术研究发展计划基金项目(2007AA01Z104);;国家自然科学基金项目(60873074,60903203)~~
摘    要:功耗分析攻击成为嵌入式加密芯片的最大威胁,它破解密码芯片密钥比穷举法要快得多,是一种新的密钥攻击方法.对功耗分析攻击与防御成为近年来研究的热点问题,功耗分析模型是研究功耗攻击与防御的基础,在对功耗攻击模型研究进展进行评述后,分别对功耗分析攻击与防御进行综述,功耗攻击从简单功耗分析攻击、差分功耗分析攻击和高阶差分功耗分析攻击进行比较,防御从算法级和电路级进行对比,并对文献进行了分类整理.通过对国内外研究进展的总结和对比,为特定领域的嵌入式加密芯片提供抗功耗分析攻击解决方案,最后对进一步研究的问题进行了展望.

关 键 词:嵌入式加密芯片  功耗分析  模型  攻击  防御  

Development on Power Analysis Attack and Defense of Embedded Cipher Chip
Edwin H-M Sha.Development on Power Analysis Attack and Defense of Embedded Cipher Chip[J].Journal of Computer Research and Development,2010,47(4).
Authors:Edwin H-M Sha
Affiliation:School of Computers and Communications;Hunan University;Changsha 410082;Department of Computer Science;Hengyang Normal University;Hengyang;Hunan 421008;School of Computer Science;National University of Defense Technology;Changsha 410073;Department of Computer Science;University of Texas at Dallas;Richardson;USA 75083
Abstract:Power analysis attack has become one of the most serious threats to break embedded security chips.It can crack security chips much faster than exhaustive search methods.It is a new attack method of secret key.Power analysis attack and its defense have attracted much attention in recent years.First studied in this paper are the power models that can be used for power analysis attacks and defense.It is pointed out that the high-performance and general-purpose model of power analysis attacks remains a very imp...
Keywords:embedded cryptographic chip  power analysis  model  attack  defense  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号