Font Size: a A A

Design And Implementation Of Differential Power Analysis Attack Platform

Posted on:2017-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z H LiFull Text:PDF
GTID:2308330503968518Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the field of information security, various password analysis means emerge. And according to the conventional password security algorithm analysis different ways, side channel to pay more attention to safety analysis algorithm in hardware, operation characteristics through the power consumption and electromagnetic radiation, error induced by way of leaked information, the great limit gain and safety of the key data algorithm.For now, the security of the embedded chip for the biggest threat is the power consumption of the attack, and has been the world authoritative proved to be a very effective method for the key. So, about how to solve the power consumption brought by the security problem of the attack has become the focus of research at home and abroad in recent years. At present the power consumption of the analysis method of attack can be divided into algorithm based on level mask and based on the power consumption of the constant level two kind of technique to realize the circuit. But, for embedded equipment encryption module designer, only in the sample of the embedded was created, they can verify algorithm software, and other aspects of design whether can resist power consumption analysis attack.The author investigates the DES encryption algorithm rules, difference power consumption and power consumption model attack algorithm, and finally achieve a new computer platform can simulate an embedded chip power consumption of the attack of the software, the success of the round keys DES algorithm and difference power attack. The use of this software simulation power attack can be made in the product before the power consumption of embedded chip resistance analysis against performance analysis, reduce development time and development costs, and at the same time, improve work efficiency, and has high practical value.
Keywords/Search Tags:password operation, power attack, simulation platform, embedded
PDF Full Text Request
Related items