首页> 外文OA文献 >Hardware level countermeasures against differential poweranalysis
【2h】

Hardware level countermeasures against differential poweranalysis

机译:针对差动电源的硬件水平对策分析

摘要

Hardware implementations of mathematically secure algorithms unintentionally leak side channel information, that can be used to attack the device. Such attacks, known as side channel attacks, are becoming an increasingly important aspect of designing security systems. In this thesis, power analysis attacks are discussed along with existing countermeasures. In the first part of the thesis, the theory and practice of side-channel attacks is introduced. In particular, it is shown that plain implementations of block ciphers are highly susceptible to power-analysis attacks.Dual rail precharge (DRP) circuits have already been proposed as an effective countermeasure against power analysis attacks. DRP circuits suffer from an implementation problem; balancing the routing capacitance of differential signals. In this thesis we propose a new countermeasure, path switching, to address the routing problem in DRP circuits which has very low overheads compared to existing methods. The proposed countermeasure is tested with simulations and experimentally on an FPGA board. Results from these tests show a minimum of 75 times increase in the power traces required for a first order DPA attack.Some of the existing countermeasures to address the routing problem in DRP circuits do not consider coupling capacitance between differential signals. In this thesis we propose a new method, divided backend duplication that effectively addresses balanced the routing problem of DRP circuits. The proposed countermeasure is tested with simulations and results show a minimum of 300 times increase in the power traces required for a first order DPA attack.Randomisation as a DPA countermeasure is also explored. It is found that randomising the power consumption of the cryptographic device itself has little impact on DPA. Randomising the occurrence of intermediate results, on which DPA relies on, has better effect at mitigating DPA.
机译:数学上安全的算法的硬件实现无意间泄漏了可用于攻击设备的边信道信息。这种被称为旁通道攻击的攻击正在成为设计安全系统的一个越来越重要的方面。本文讨论了功率分析攻击以及现有的对策。在论文的第一部分,介绍了边信道攻击的理论和实践。尤其是,它表明分组密码的简单实现极易受到功率分析攻击的影响。双轨预充电(DRP)电路已被提出作为抵抗功率分析攻击的有效对策。 DRP电路存在实施问题。平衡差分信号的路由电容。在本文中,我们提出了一种新的对策,即路径切换,以解决DRP电路中的路由问题,与现有方法相比,其开销非常低。拟议的对策已通过仿真进行了测试,并在FPGA板上进行了实验。这些测试的结果表明,一阶DPA攻击所需的电源走线至少增加了75倍。解决DRP电路中布线问题的一些现有对策未考虑差分信号之间的耦合电容。在本文中,我们提出了一种新的分割后端复制方法,该方法可以有效解决DRP电路的路由问题。该拟议的对策经过仿真测试,结果表明一阶DPA攻击所需的功率迹线至少增加了300倍,还探讨了将随机化作为DPA对策。已经发现,随机化密码设备本身的功耗对DPA几乎没有影响。随机化DPA所依赖的中间结果的发生在减轻DPA方面具有更好的效果。

著录项

  • 作者

    Baddam Karthik;

  • 作者单位
  • 年度 2012
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号