首页> 外文OA文献 >Power Analysis Attacks against FPGA Implementations of the DES
【2h】

Power Analysis Attacks against FPGA Implementations of the DES

机译:功耗分析攻击DES的FPGA实现

摘要

Cryptosystem designers frequently assume that secret parameters will be manipulated in tamper resistant environments. However, physical implementations can be extremely difficult to control and may result in the unintended leakage of side-channel information. In power analysis attacks, it is assumed that the power consumption is correlated to the data that is being processed. An attacker may therefore recover secret information by simply monitoring the power consumption of a device. Several articles have investigated power attacks in the context of smart card implementations. While FPGAs are becoming increasingly popular for cryptographic applications, there are only a few articles that assess their vulnerability to physical attacks. In this article, we demonstrate the specific properties of FPGAs w.r.t. Differential Power Analysis (DPA). First we emphasize that the original attack by Kocher et al. and the improvements by Brier et al. do not apply directly to FPGAs because their physical behavior differs substantially from that of smart cards. Then we generalize the DPA attack to FPGAs and provide strong evidence that FPGA implementations of the Data Encryption Standard (DES) are vulnerable to such attacks.
机译:密码系统设计人员经常假设秘密参数将在防篡改环境中进行操作。但是,物理实现可能极难控制,并可能导致意外的侧信道信息泄漏。在功耗分析攻击中,假定功耗与正在处理的数据相关。因此,攻击者可以通过简单地监视设备的功耗来恢复秘密信息。有几篇文章研究了在智能卡实现中的电源攻击。尽管FPGA在密码学应用中正变得越来越流行,但仅有几篇文章评估了其对物理攻击的脆弱性。在本文中,我们演示了带FPGA的FPGA的特定属性。差分功率分析(DPA)。首先,我们强调Kocher等人的原始攻击。和Brier等人的改进。不能直接应用于FPGA,因为它们的物理行为与智能卡大不相同。然后,我们将DPA攻击概括为FPGA,并提供有力的证据表明,数据加密标准(DES)的FPGA实现容易受到此类攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号