首页 | 本学科首页   官方微博 | 高级检索  
     检索      

针对AES算法的差分功耗分析研究与实现
引用本文:李志祥,丁国良,王希武,林克成.针对AES算法的差分功耗分析研究与实现[J].河北工业科技,2010,27(2):76-78,91.
作者姓名:李志祥  丁国良  王希武  林克成
作者单位:军械工程学院计算机工程系,河北石家庄,050003
基金项目:国家"863"计划项目 
摘    要:为研究AES算法面对差分功耗分析(DPA)的安全性,在指令级分析了微控制器的功耗模型,讨论了差分功耗分析中D函数的选择问题,成功地运用DPA方法攻击了在微控制器上实现的AES算法。最少只需300个明文样本在20 min内即可获取完整的密钥,从而实证了AES算法面对DPA方法攻击时的脆弱性,并揭示了该算法在微控制器实现中的密钥信息泄露点。

关 键 词:差分功耗分析  高级加密标准  信息安全  功耗模型

Research and implementation of differential power analysis against AES
LI Zhi-xiang,DING Guo-liang,WANG Xi-wu and LIN Ke-cheng.Research and implementation of differential power analysis against AES[J].Hebei Journal of Industrial Science & Technology,2010,27(2):76-78,91.
Authors:LI Zhi-xiang  DING Guo-liang  WANG Xi-wu and LIN Ke-cheng
Institution:Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang Hebei 050003,China;Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang Hebei 050003,China;Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang Hebei 050003,China;Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang Hebei 050003,China
Abstract:Aiming at research into AES security against differential power analysis(DPA),we analyzed the microcontroller power model at the instruction level,discussed the selection of D function in attacking AES,and finally successfully attacked an implementation of AES on microcontroller by means of DPA.Only 300 plaintexts are needed to reveal the full key in 20 minutes.It proves that AES is vulnerable when facing DPA and finds where the most significant leakage of secret information happens.
Keywords:differential power analysis(DPA)  advanced encryption standard(AES)  information security  power model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《河北工业科技》浏览原始摘要信息
点击此处可从《河北工业科技》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号