Font Size: a A A

Research On Differential Power Analysis Of Cryptographic Chip And Security Evaluation

Posted on:2013-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q LiFull Text:PDF
GTID:2248330395480568Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
During the past twenty years, the Power Analysis (PA) has been a prevalent attacktechnology and become a serious threat to the security of crypto chips. The design of resistingPA has also been obligatory to the crypto chips. At the same time, the evaluation to the cryptochips has been a necessitous problem. For discussing the problem of evaluation to the cryptochips’ capability to resist PA, the main work is listed as follows.1.Relationship of the comparative nonlinearity and the Hamming weight decision functionThe core of block cipher is the nonlinear part—S box. Based on the relationship of thecomparative nonlinearity and the DPA attack, we have proposed the method of selecting theHamming weight decision function namely, to choose the maximal nonlinearity of the S-box’soutputs by way of the Hamming weight decision function. In the platform we established, theHamming weight decision function method has been validated.2. Method of samples selecting for the DPA attackThe problem of samples selecting has direct relation with the result we can get, andwhether the result is dependable. Based on the simulate platform and the real test platform, wehave studied the method of samples selecting for the DPA attack, and proposed the mode andamount of the simulate validation and real test validation. For the simulate validation, thesamples should be arranged in order and its amount is2n(n is the number of S-box’s inputs).For the real test validation, the samples should be stochastic, and making the use of the formulawe computed before we can get its amount. At last, we have analyzed the influence thatdifferent arithmetic and hardware implementation brought on.3. Evaluation technology of block cipher chips’ capability to resist DPA attackThe two aspects’ harvests above can be used to measure the crypto chips’ capability toresist DPA attack. In the arithmetic design phase, we commence on measuring its capability toresist DPA attack by calculating the comparative nonlinearity of the arithmetic’s nonlinear part.At the time when we attack the crypto chips, the samples amount can also be used to measureits capability of resisting DPA attack. Based on the two aspects’ investigation, we haveresearched the evaluation technology of block cipher chips’ capability to resist DPA attack. Wehave established an integrated evaluation flow, generalized systemic evaluation method to thenon-defend block cipher chips’ capability of resisting DPA attack, and proposed a suit ofevaluation guideline.The investigation of DPA attacking technology could afford feelings for resisting DPAattack design. And the guidelines we proposed could be used to measure its capability to resist DPA attack.
Keywords/Search Tags:Crypto chips, Block cipher, Power analysis, Comparative nonlinearity, Sampleamount, Measurement evaluation
PDF Full Text Request
Related items