Font Size: a A A

Research On A Countermeasure Against Power Analysis Attack For Heterogeneous Cryptosystems

Posted on:2016-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:S YinFull Text:PDF
GTID:2428330473464961Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The information security has become a big issue that impact people's daily lives,moreover,it has become a serious threat to national security in finance,national defense and military.The kernel of the information security is the security of cryptographic algorithm.However,even the cryptographic algorithm is proved to be safe using mathematical methods,the cryptosystem can be breached in a particular way,for example,the power analysis attack,which can crack the private keys by analyzing on the power consumption information leaked from cryptosystems.Recent years,the security of cryptosystems has been under serious threat because of the power analysis attack.Therefore,the study on countermeasures against power analysis attacks has become a research hotspot of information securityThis article considers the characteristics of heterogeneous cryptosystems such as ATM encrypted password keyboards and studies on the countermeasures against power analysis attacks for heterogeneous cryptosystems on the basis of dual-rail per-charge logic and mask technology,for the purpose of using the least-cost countermeasures to resist against power analysis attacks for heterogeneous cryptosystems under various constraints.The main work of this paper can be described as follows:In order to set countermeasures against power analysis attacks for heterogeneous cryptosystems,this article designs a strategy for heterogeneous cryptosystems to resist against power analysis attacks and builds system model by analyzing the implementation costs of dual-rail per-charge logic and mask technology.The strategy aims at using the least-cost countermeasures to resist against power analysis attacks for heterogeneous cryptosystems under the system constraints.In order to find the optimal solution to the system model,this article proposes a searching optimization algorithm based on the Greedy algorithm and the improved Simulated Annealing algorithm.The Simulated Annealing algorithm is improved by improving its cost function.The searching optimization algorithm uses Greedy algorithm for pre-partition the task sets,then the improved Simulated Annealing algorithm is used for global optimization.To verify the feasibility of the strategy designed for heterogeneous cryptosystems to resist against power analysis attacks and the effectiveness of the searching optimization algorithm based on the Greedy algorithm and the improved Simulated Annealing algorithm,this article designs simulations based on the commonly-used testing tools.The experiment results show that the strategy designed for heterogeneous cryptosystems is feasible and the least-cost countermeasures to resist against power analysis attacks for heterogeneous cryptosystems can be found by using the proposed searching optimization algorithm under various constraints.The experiment results also show that the convergent rate of the improved Simulated Annealing algorithm is faster than algorithms compared.
Keywords/Search Tags:Power Analysis Resistant, Heterogeneous Multi-Core, Mask, Dual-Rail Per-Charge Logic, Hardware/Software Partitioning
PDF Full Text Request
Related items