Font Size: a A A

The Research On Electromagnetic Analysis Attack For Block Crypto Chips

Posted on:2013-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:E P DuanFull Text:PDF
GTID:2248330395480576Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
When the cryptographic chip works, it will inevitably leak some side channel informationsuch as time, power and electromagnetic radiation. Because of the relation of above-mentionedinformation to the crypto-operation and data on the inner cryptographic chip, the side channelattack can be conducted to the cryptographic chip by use the above-mentioned information.According to the different information mentioned above, the side channel attack can be dividedinto timing attack, power attack, electromagnetic analysis attack, and so on.Compared to power attack, the electromagnetic analysis attack mainly analyses theelectromagnetic information of the cryptographic chip to gain the key, and the electromagneticanalysis attack does not require decomposing and altering the circuit, so this attack is hidden anddifficult to detect. This paper researches the electromagnetic analysis attack for blockcryptographic chip. The mainly studies are as follows:Firstly, the paper establishes an electromagnetic information collecting platform. Then itelaborates the structure, components and usage of this platform, and analyses the influence onthe collection resulted from noises. And then it uses the electromagnetic radiation characteristicsof DES and AES to verify the validity of this platform. The result shows that the electromagneticinformation, generated by cryptographic chips in the working process, can be obtainedaccurately by the platform.Secondly, this paper studies the technique of differential electromagnetic analysis (DEMA).In order to select a suitable decision function, this paper proposes a kind of DEMA peaksimulation analysis method based on the Hamming-Weight model. By this method, itrespectively conducts DEMA peak simulation analysis on DES and AES cryptographicalgorithms. Utillized the platform mentioned above, the electromagnetic information is collectedfrom implemention of DES and AES cryptographic algorithms based on FPGA, moreover,DEMA attack is conducted according to the decision function obtained by simulation analysis.The result proves the validity of this method.Finally, this paper researches the technique of correlation electromagnetic analysis (CEMA).In order to select suitable attack point, this paper proposes a kind of CEMA peak simulationanalysis method based on the Hamming-Weight model. By this method, it respectively conductsCEMA peak simulation analysis on DES and AES cryptographic algorithms. Utillized theplatform mentioned above, the electromagnetic information is collected from implemention ofDES and AES cryptographic algorithms based on FPGA, moreover, CEMA attack is conductedaccording to the attack point obtained by simulation analysis. The result proves the validity ofthis method. In conclusion, this paper proposes a DEMA and CEMA peak simulation analysis methodbased on the research of DEMA and CEMA attack techniques, and analyses the rationality ofdecision function and attack point resulted from S box of DES and AES, then it implements DESand AES cryptographic algorithms attack by DEMA and CEMA. The result verifies this methodcan help to enhance the efficiency of electromagnetic analysis attack on block cryptographicchip.
Keywords/Search Tags:cryptographic chip, Hamming-Weight, Differential Electromagnetic Analysis, Correlation Electromagnetic Analysis
PDF Full Text Request
Related items