Font Size: a A A

The Research And Implementation Of Power Analysis On Crypto Chips

Posted on:2016-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2308330461986298Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of modern cryptography and computer technology, the combination of the two is becoming closer and closer. Application of cryptographic protocols and algorithms are usually in software in general purpose processor platform, or running on the hardware unit customization, this kind of cipher chip has been widely used in modern information security, such as mobile phone card, bank card, USB password, password chip have been combined and our daily work and life more and more close. However, the use of physical elements bound to its environment physical interaction, therefore, the physical device information leakage is inevitable.In traditional cryptography method of attack, attack a cryptographic algorithm, the realization of the first is a further study of the cipher algorithm, to find loopholes, and then use the mathematics knowledge attack on cryptographic algorithm. This is the most traditional method of initial attack. But the side channel attack (Side Channel Attack, SCA) is the use of cryptographic chip in operation, testing their physical interaction information (such as energy consumption, electromagnetic wave, the encryption operation time etc.), through scientific measurement, statistical method, to analyze the secret information. The password system attack often objectively divided into intrusion type, semi invasive, non-invasive, non intrusive way safety of side channel attacks of this pair of cryptographic devices poses a great threat. The research of this field at home and abroad have made considerable achievements, has found that many kinds of side channel attack. Kocher in more than 10 years ago, proposed one kind of side channel attack method (timing attack and power analysis attacks), this kind of attack method is based on the internal state of the device password and encryption there is a correlation between the physical measurements at different time points algorithm procedure in the running, and this correlation is often and key information and operation data the corresponding direct association. With the development of side channel attack technology, the advent of currently has many side channel attack, such as timing attacks, power analysis attacks, electromagnetic analysis attack, fault attack, based on the cache attack, attack, attack, the error message scanning optical radiation attack, attack, attack frequency sound, combined attacks. At present, the power analysis attack method is one of the most powerful side channel attack method, because the password algorithm is now the large scale integrated circuit which forms in electronic components to achieve, so in the logic 0 and logic 1 interactive process, there must be differences between high level and low level, this class of electromagnetic the physical element leakage is very difficult to avoid, which provide the basis for the energy attack. The commonly used method has the simple power analysis attack (Simple Power Analysis, SPA) and differential power analysis attack (Differential Power Analysis, DPA), the correlation power analysis attacks (Correlation Power Analysis, CPA).This paper firstly introduces the internal structure of the public key algorithm is generic and encryption and decryption process, including symmetric and asymmetric algorithms. Then, the circuit structure and principle analysis of intelligent chip, they generate energy loss in operation of encryption and decryption algorithm, the circuit principle diagram of side channel energy given commonly used analysis attacks, focus on the simple power analysis attack and differential attack principle and application model of power analysis attack. Finally, the specific equipment to carry out the attack and experimental analysis on specific DES cryptogram chip and AES chip using laboratory, has achieved good effect. Based on the summary of the power analysis attack experiment, we present generally experimental method for side channel attack.
Keywords/Search Tags:Crypto chip, Side channel attack, Power analysis attack, Simple power analysis, Differential power analysis
PDF Full Text Request
Related items