Computer Science ›› 2013, Vol. 40 ›› Issue (6): 116-118.

Previous Articles     Next Articles

Quantitative Methods Based on Entropy Rate to Measure Capability for Cipher Chip to Defense Power Attacks

SHAO Qi-feng,TANG Xiao-wei,FANG Ming and YANG Tian-chi   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Two key indicators to descript randomness of cipher chip power leakage were obtained through a large number of engineering experiments:one is the distribution law of gate-level flip number,another one is the transition matrix of the number of gate-level flip.Based on the two key indicators,we introduced the concept of entropy rate in information theory.Through the entropy rate,we can dynamicly measure the speed of the entropy increasing about the power consumption waveform in the encryption process,and effectively measure the defensive performance of the cipher chip under SPA attack.

Key words: SPA attack,Entropy rate,Quantify of the defence capability,Information security

[1] 吴克辉.基于汉明重的PRESENT密码代数旁路攻击[J].计算机科学,2011,2(38):53-56
[2] 姚剑波.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2011,1(3):131-133
[3] 姚剑波,张涛.基于互信息博弈的侧信道攻击安全风险评估[J].计算机科学,2012,6(39):69-71
[4] JoyeM,Paillier P,Schoenmakers B.On second-order differential power analysis[C]∥Proc of Cryptograph ic Hardware and Embedded Systems (CHES 2005),LNCS 3659.Springer-Verlag,2005:293-308
[5] 童元满.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,2:31-33
[6] Veyrat-Charvillon N,Standaert F-X.Mutual information analysis:how,when and why?[C]∥The Proceedings of CHES 2009,Lausanne,Switzerland,September 2009.Lecture Notes in Computer Science,vol.5747,Springer,Berlin,2009:429-443
[7] Standaert F-X,Veyrat-Charvillon N,Oswald E,et al.The world is not enough:another look on second-order DPA[C]∥The Proceedings of Asiacrypt 2010,Singapore,December 2010.Lecture Notes in Computer Science,vol.6477.Springer,Berlin,2010:112-129
[8] Rivain M,Dottax E,Prouff E.Block ciphers implementations provably secure against second-orderside-channel analysis[C]∥The Proceedings of FSE 2008,Lausanne,Switzerland,February 2008.LectureNotes in Computer Science,vol.5086.Springer,Berlin,2008:127-143

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!