首页 | 官方网站   微博 | 高级检索  
     

面向DES加密算法的差分功耗分析攻击方法
引用本文:孙海涛,赵强,何循来.面向DES加密算法的差分功耗分析攻击方法[J].兵工自动化,2007,26(6):53-55.
作者姓名:孙海涛  赵强  何循来
作者单位:军械工程学院火炮工程系,河北石家庄050003;军械工程学院计算机工程系,河北石家庄050003
摘    要:基于旁路攻击原理,针对运行DES密码算法的密码系统,先进行N次密码运算,获取N个随机明文输入.再定义与密钥密切相关的函数,将基于采样时间点的信号数组集合分成两个子集合并计算其平均功耗值.同时观察差分功耗曲线某个位置是否出现明显尖峰判断之前密匙猜测是否正确.最后通过推算及差分功率分析其攻击,获取DES密码算法中第16轮子密钥K16.并从实验平台上实现了差分功耗分析攻击.

关 键 词:DES密码算法  差分功耗分析攻击  密钥猜测  旁路攻击
文章编号:1006-1576(2007)06-0053-03
收稿时间:2007-04-08
修稿时间:2007-04-082007-05-04

Differential Power Attack Analysis for DES Code Algorithm
SUN Hai-tao,ZHAO Qiang,HE Xun-lai.Differential Power Attack Analysis for DES Code Algorithm[J].Ordnance Industry Automation,2007,26(6):53-55.
Authors:SUN Hai-tao  ZHAO Qiang  HE Xun-lai
Affiliation:1. Dept. of Guns Engineering, Ordnance Engineering College, Shijiazhuang 050003, China; 2. Dept. of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China
Abstract:Based on side channel attacks theory and DES code algorithm, the project carries out N time code calculating to acquire N random inputs, then it defines relative functions of secret key, divides the signal array Unit, which based on sampling time spot, into 2 subunits and calculates its average power value. Meanwhile, the project observes whether evident peaks appear at any points of the differential power curve to judge whether the previous secret key assumption is right or not. Thus through reckoning and differential power analyzing the attack, it acquires the 16th sub secret key K!6 of DES code algorithm. At last, the differential power analysis attack on test platform can be realized.
Keywords:DES code algorithm  Differential power attack analysis  Secret key hypothesizing  Side channel attacks (SCA)
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号