计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 116-118.

• 信息安全 • 上一篇    下一篇

基于熵率的密码芯片抵御SPA功耗攻击能力的量化方法

邵奇峰,唐小伟,方明,杨天池   

  1. 解放军信息工程大学 郑州450004;解放军75576部队 海口570236;解放军信息工程大学 郑州450004;解放军信息工程大学 郑州450004
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61072047)资助

Quantitative Methods Based on Entropy Rate to Measure Capability for Cipher Chip to Defense Power Attacks

SHAO Qi-feng,TANG Xiao-wei,FANG Ming and YANG Tian-chi   

  • Online:2018-11-16 Published:2018-11-16

摘要: 通过大量的工程实验获得了描述密码芯片功耗泄漏量随机性的两个关键指标:一是门级翻转数量的分布律,二是门级翻转数量的转移矩阵。以这两个关键指标为基础,引入信息论中熵率的概念,通过熵率的值动态地测量密码芯片在加密过程中功耗波形的熵值随机器周期数量的增长速度,进而有效地衡量密码芯片在SPA攻击下所具备的防御性能。

关键词: SPA攻击,熵率,防御性能量化,信息安全

Abstract: Two key indicators to descript randomness of cipher chip power leakage were obtained through a large number of engineering experiments:one is the distribution law of gate-level flip number,another one is the transition matrix of the number of gate-level flip.Based on the two key indicators,we introduced the concept of entropy rate in information theory.Through the entropy rate,we can dynamicly measure the speed of the entropy increasing about the power consumption waveform in the encryption process,and effectively measure the defensive performance of the cipher chip under SPA attack.

Key words: SPA attack,Entropy rate,Quantify of the defence capability,Information security

[1] 吴克辉.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,2(38):53-56
[2] 姚剑波.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2011,1(3):131-133
[3] 姚剑波,张涛.基于互信息博弈的侧信道攻击安全风险评估[J].计算机科学,2012,6(39):69-71
[4] JoyeM,Paillier P,Schoenmakers B.On second-order differential power analysis[C]∥Proc of Cryptograph ic Hardware and Embedded Systems (CHES 2005),LNCS 3659.Springer-Verlag,2005:293-308
[5] 童元满.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,2:31-33
[6] Veyrat-Charvillon N,Standaert F-X.Mutual information analysis:how,when and why?[C]∥The Proceedings of CHES 2009,Lausanne,Switzerland,September 2009.Lecture Notes in Computer Science,vol.5747,Springer,Berlin,2009:429-443
[7] Standaert F-X,Veyrat-Charvillon N,Oswald E,et al.The world is not enough:another look on second-order DPA[C]∥The Proceedings of Asiacrypt 2010,Singapore,December 2010.Lecture Notes in Computer Science,vol.6477.Springer,Berlin,2010:112-129
[8] Rivain M,Dottax E,Prouff E.Block ciphers implementations provably secure against second-orderside-channel analysis[C]∥The Proceedings of FSE 2008,Lausanne,Switzerland,February 2008.LectureNotes in Computer Science,vol.5086.Springer,Berlin,2008:127-143

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!