首页> 外文会议> >A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies
【24h】

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies

机译:基于仿真的密码学功能单元DPA抵抗力评估方法论,应用于CMOS和MCML技术

获取原文

摘要

This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analysis (DPA) attacks. Circuits implemented in MCML, in fact, have unique characteristics both in terms of power consumption and the dependency of the power profile from the input signal pattern. Therefore, MCML is suitable to protect cryptographic hardware from DPA and similar side-channel attacks. In order to demonstrate the effectiveness of different logic styles against power analysis attacks, the non-linear bijective function of the Kasumi algorithm (known as substitution box S7) was implemented with CMOS and MCML technology, and a set of attacks was performed using power traces derived from SPICE-level simulations. Although all keys were discovered for CMOS, only very few attacks to MCML were successful.
机译:本文探讨了MOS电流模式逻辑(MCML)对差分功率分析(DPA)攻击的抵抗力。实际上,以MCML实施的电路在功耗和输入信号模式对功率分布的依赖性方面均具有独特的特性。因此,MCML适用于保护加密硬件免受DPA和类似的旁信道攻击。为了证明不同逻辑样式对功率分析攻击的有效性,Kasumi算法的非线性双射函数(称为替换框S7)通过CMOS和MCML技术实现,并使用功率迹线进行了一系列攻击衍生自SPICE级别的模拟。尽管发现了所有用于CMOS的密钥,但对MCML的攻击很少成功。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号