首页> 中文期刊> 《北京电子科技学院学报》 >针对改进的Masking方法的差分功耗攻击

针对改进的Masking方法的差分功耗攻击

         

摘要

Since Differential Power Analysis (DPA) on DES in smartcards was firstly published by Kocher et al. in 1999, many countermeasures have been proposed to protect cryptographic algorithms from the attack, of which masking is an efficient and easily implemented method. In [2], Akkar and Giraud introduced the transformed masking method, an alternative countermeasure to the DPA. However, in this paper, authors conducted a successful Differential Power Analysis DPA attacks on a Triple Data Encryption Standard TDES hardware implementation on smartcard. The experiment resuits prove that the transformed masking method is not sufficiently to resist the attack of DPA and the same, the DES implementation of masking on key in [7] will also be vulnerable to the corresponding attacks above.%自1999年Kocher等人提出针对智能卡中DES的差分功耗攻击(DPA)以来,针对DPA的各种防御策略也被大量的提出,Masking就是其中一种简单、高效的方法。文献[2]中Akkar提出了一种改进的Masking方法,然而,本文基于实际的智能卡芯片对该方法成功进行了攻击试验。实验结果表明该方法并不能抵抗DPA的攻击。以此类推,文献[7]中提出的仅对密钥K进行掩码的方法亦不能抵抗DPA的攻击。

著录项

相似文献

  • 中文文献
  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号