Font Size: a A A

The Research Of IC Chip Side Channel Attack Analysis Method

Posted on:2013-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2248330392961023Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In the global information revolution, the development of informationtechnology is the strong factor of social progress and development, andgreatly change the people’s work, life and study.It brings the society greatconvenience, but at the same time, it also brings us serious securitychallenges.Along with the information security attack technology continuingdevelopment, the information security attack direction gradually convertfrom software to hardware and even the IC integrated circuit.Aiming to thechip’s security, there are a lot of attack or crack methods, during whichside-channel attack (SCA) method is the most representative and thegreatest threat. SCA is a new type of cipher analysis method, which breaksthrough the traditional cipher analysis thinking mode, using the correlationbetween cryptographic chip operation process and various physicalinformation leakage (such as power, electromagnetic radiation, sound, thevisible light) to crack the password system.Comparing to the traditionalpassword analysis methods, SCA technology has smaller key search spaceand better analysis efficiency.In this paper, the research object is the SCA of IC chip. Thefundamental principle of SCA is that the IC chip’s integrated circuitinternal logic is not balanced, witch causes the obvious correlationbetween side-channel information leakage such as power consumption,electromagnetic radiation and chip internal circuit overturned during theencryption or decryption process. This paper focuses on the two common methods which are the simple/differential power analysis (SPA/DPA) andthe electromagnetic radiation analysis (EMA), and analyzes the theory,mathematical model to bring out technical solutions of these two methods.1) Designing differential power distinquish function modle and RSAmontgomery modular multiplication analysis modle to do DPA and SPA tocrack chip DES algorithm and RSA algorithm.2) Designing differentialEMA distinquish function modle to do EMA to crack DES algorithm.In order to prove the SCA research methodology and analysisprogram’s practicability and effectiveness, the paper introduce the attack-analysis platform, which is used to do complete SCA experiment cases tosucceed in cracking DES and RSA key. These cases not only prove thecorrect of methodology, but also find IC chip‘s power or electromagneticradiation leakage security vulnerability without special protectivemeasures. We also do SPA exam on improved MIST randomized modularRSA algorithm. Comparing to original RSA algorithm, improvedalgorithm has better Anti-SPA effect.These analysis methods also have some limitations, so we pointseveral key research derections on future SCA methods, witch deal withthe advanced counter measures such as masking, random delay and so on.
Keywords/Search Tags:side-channel attack, simple power analysis, differential power analysis, differential power distinguish function, electromagnetic radiation analysis
PDF Full Text Request
Related items