Font Size: a A A

Research On Power Analysis Attack Of Symmetric Encryption Algorithm

Posted on:2015-05-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:N H ZhuFull Text:PDF
GTID:1228330452466618Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer and the internet,information technology is changing the mode of life and thinkingfundamentally. Security chip, as the carrier of information security, itssecrutiy is paid more and more attention. Power analysis attack hasbecome an important attack, become of its easy to implement and goodattack effect. Power analysis attack is a major threat to security chip.This thesis focused on countermeasures of power analysis attackabout symmetric algorithm. Countermeasure of dynamic power analysisattack and leakage powr analysis attack is exclusively studied exhaustivly,and many countermeasures are proposed. The innovations of this thesis areas followings:1. Propose implementation of S-Box of typical symmetric algorithmand quantitative assessment of leakage of information through power ofS-Box. Inverse in GF(28) of AES and SM4S-Box is computed incomposite fileds. Inverse in GF(28) is transformed multiplication, inverseand multiplication by constant in GF(24), which can reduce areas of S-Box.In this thesis, extent of leakage information of DES, AES amd SM4through power is evaluated quantitatively. Experiments show that, extentof leakage information through lekage power is significantly greater thanexthen of the leakage information through dynamic power.2. Proposed improved masking strategy of allocating registerrandomly for DES algorithm, second order making scheme duringencryption and decryption for AES and SM4algorithm, and also proposedfirst order masking scheme in key expending for AES and SM4algorithm.Improved masking strategy of allocating register randomly can resist leakage hamming distance between iteration. The proposedcountermeasures can resist first order, second order and template attacks.3. Proposed complementary circuit implemented in algorithm leveland give detailed algorithm of how to constructing complementaryalgorithm to AES. Complemenatary circuits proposed in this thesis canslove the need to costom differential and precharge logic, while thecountermeasure is fully compatible with existing chip design process.4. Propose random ring oscillator to resist leakge power analysisattack, and veriy the effectiveness the complementary circuit and maskingtechnology. Random ring oscillator is not based in specific algotihme, andcan be usefull in S-Box of any algorithm.
Keywords/Search Tags:security chip, side channel attack, power analysis attack, masking, complementary circuit
PDF Full Text Request
Related items