[1]李杰,单伟伟,吕宇翔,等.一种抗相关功耗攻击DES算法及FPGA电路实现[J].东南大学学报(自然科学版),2012,42(6):1063-1068.[doi:10.3969/j.issn.1001-0505.2012.06.008]
 Li Jie,Shan Weiwei,Lü Yuxiang,et al.A correlation power analysis resistant DES algorithm and its circuit implementation on FPGA[J].Journal of Southeast University (Natural Science Edition),2012,42(6):1063-1068.[doi:10.3969/j.issn.1001-0505.2012.06.008]
点击复制

一种抗相关功耗攻击DES算法及FPGA电路实现()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
42
期数:
2012年第6期
页码:
1063-1068
栏目:
电路与系统
出版日期:
2012-11-20

文章信息/Info

Title:
A correlation power analysis resistant DES algorithm and its circuit implementation on FPGA
作者:
李杰 单伟伟 吕宇翔 孙华芳
东南大学国家专用集成电路系统工程技术研究中心,南京 210096
Author(s):
Li Jie Shan Weiwei Lü Yuxiang Sun Huafang
National ASIC System Engineering Research Center, Southeast University, Nanjing 210096,China
关键词:
差分功耗攻击 DES算法 掩码技术 抗功耗攻击 FPGA
Keywords:
differential power analysis data encryption standard algorithm mask technology power analysis attack resistance FPGA(field-programmable gate array)
分类号:
TN47
DOI:
10.3969/j.issn.1001-0505.2012.06.008
摘要:
针对目前以差分功耗攻击为代表的旁路攻击技术对加密设备的安全性造成了严重威胁的状况,提出了一种基于“非对称”掩码的新型抗差分功耗攻击的方法,并在标准加密算法(DES)中实现.即通过在算法的不同时刻引入不同的随机掩码变换,使加密设备的功耗与密钥之间的相关性被扰乱,从而抵御相关功耗攻击.以此方案设计了电路并采用FPGA实现了电路.搭建了功耗攻击的FPGA实物平台,分别对未加防御的DES和抗相关功耗攻击DES算法电路进行相关功耗攻击实验.实验结果表明,以增大5倍攻击样本且花费了近5倍的破译时间为代价,仍无法攻破该方法保护的DES算法,可见 “非对称”掩码方法对相关功耗攻击起到了防御效果.
Abstract:
With the threat of differential power analysis(DPA, a type of side channel attack)to encryption devices, a new DPA countermeasure method is proposed and implemented on data encryption standard(DES)algorithm, using “asymmetric” mask technique which introduces asymmetrical random transformation to eliminate the relevance between power consumption and the key in order to resist DPA attack. Its hardware implementation was designed and realized on FPGA(field-programmable gate array). Then, a real power analysis attack FPGA platform is built to test the proposed DES as well as the unprotected DES respectively. The experiment results show that even when the power samples and analyzing time are nearly 5 times larger than the unprotected DES, our improved DES still cannot be attacked to gain the right key by Correlation Power Analysis. Therefore, the “asymmetric” mask technique is effective in resisting correlation power analysis.

参考文献/References:

[1] Kelsey J,Schneier B,Wagner D,et al.Side channel cryptanalysis of product ciphers[J].Journal of Computer Security,2000,8(2/3):141-158.
[2] Kocher Paul,Jaffe Joshua,Jun Benjamin.Differential power analysis[C] //19th Annual International Cryptology Conference.California,USA,1999:388-397.
[3] Mangard Stefan,Oswald Elisabeth,Popp Thomas.Power analysis attacks[M].Berlin,Germany:Springer Science,2007:178-183.
[4] Zafar Y,Park J,Har D,et al.Random clocking induced DPA attack immunity in FPGA[C] //IEEE International Conference on Industrial Technology. Gwangju Korea,2010:1068-1070.
[5] Kamoun N,Bossuet L,Ghazel A.Correlated power noise generator as a low cost dpa countermeasures to secure hardware AES cipher[C] //3rd International Conference on Signals Circuits and Systems. Tunis,Tunisia,2009:1-6.
[6] Guiley S,Sauvage L,Hoogvorst P,et al.Security evaluation of WDDL and SecLib countermeasures against power attacks[J].IEEE Transactions on Computers,2008,57(11):1482-1497.
[7] Akkar M L,Goubin L.A generic protection against high-order differential power analysis[C] //10th International Workshop on Fast Software Encryption.Lund,Sweden,2003:192-205.
[8] Trichina E,Korkishko L.Secure and efficient AES software implementation for smart cards[C] //5th International Workshop on Information Security Applications.Jeju,Korea,2004:425-439.
[9] Yoshikawa M,Kojima Y.Efficient random number for the masking method against DPA attacks[C] //21st International Conference on Systems Engineering.Las Vegas,NV,USA,2011:321-324.
[10] Akkar M L,Giraud C.An implementation of DES and AES,secure against some attacks[C] //Third International Workshop on Cryptographic Hardware and Embedded Systems(CHES).Paris,France,2001:309-318.

备注/Memo

备注/Memo:
作者简介: 李杰(1969—),男,博士,研究员; 单伟伟(联系人),女,博士,副教授,wwshan@seu.edu.cn.
基金项目: 国家自然科学基金资助项目(61006029)、江苏省基础研究计划资助项目(BK2010165,BK2010167).
引文格式: 李杰,单伟伟,吕宇翔,等.一种抗相关功耗攻击DES算法及FPGA电路实现[J].东南大学学报:自然科学版,2012,42(6):1063-1068. [doi:10.3969/j.issn.1001-0505.2012.06.008]
更新日期/Last Update: 2012-11-20