首页> 外文会议> >A Power Analysis Attack Countermeasure Based on Random Execution
【24h】

A Power Analysis Attack Countermeasure Based on Random Execution

机译:基于随机执行的功率分析攻击对策

获取原文
获取原文并翻译 | 示例

摘要

Side-channel Attack, such as simple power analysis and differential power analysis (DPA), is an efficient method to gather the key, which challenges the security of crypto chips. Side-channel Attack logs the power trace of the crypto chip and speculate the key by statistical analysis. To reduce the threat of power analysis attack, an innovative method based on random execution is proposed in this paper. In order to enhance ability against DPA, the method disorders the correspondence between power trace and operands by scrambling the data execution sequence randomly and dynamically. Experiments and verification are done on the Sakura-G FPGA platform. The results show that the key is not reveal after even 1 million power traces by adopting proposed method and only 1.12% slices overhead is introduced. Compared to unprotected chip, it increases more than 140× measure to disclosure.
机译:诸如简单功率分析和差分功率分析(DPA)之类的边信道攻击是一种收集密钥的有效方法,这对加密芯片的安全性提出了挑战。边信道攻击记录了加密芯片的功率轨迹,并通过统计分析推测密钥。为了减少功耗分析攻击的威胁,提出了一种基于随机执行的创新方法。为了增强抗DPA的能力,该方法通过随机且动态地加扰数据执行序列来扰乱功率跟踪和操作数之间的对应关系。在Sakura-G FPGA平台上进行了实验和验证。结果表明,采用所提出的方法,即使经过一百万次功率跟踪也无法揭示关键,并且仅引入了1.12%的切片开销。与未保护的芯片相比,公开披露量增加了140倍以上。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号