Font Size: a A A

Hardware Implementation Of Cryptographic Algorithm And Research On Side Channel Attack And Defense Technology

Posted on:2020-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhaoFull Text:PDF
GTID:2428330575471642Subject:Engineering
Abstract/Summary:PDF Full Text Request
As an important means to ensure the safe transmission of information,cryptographic algorithms have been widely concerned.However,being the platform of cryptographic algorithm,the security of the encryption device itself is easy to be ignored.With the wide application of encryption device in modern society,the existence of side channel analysis and hardware Trojan is a great threat to the security of the information.In this paper,based on China's standard algorithms of SM4 block cipher and ZUC steam cipher,we studied the design of hardware Trojan for encryption circuit and the side channel security of ZUC steam algorithm.This paper mainly did the following aspects of the work.1.We proposed a novel Trojan side channel at RTL level with high concealment.The random number of the mask scheme is attacked after the Trojan is activated which let the attacker extract the password easily by the side channel analysis technology and won't change the output logic of the circuit.By comparing the circuit power consumption and resource utilization before and after the trojan implantation,and the situation that output of the circuit doesn't be changed when the Troajn is activated,we can draw a conclude that the Trojan has high concealment.Then we try to use Correlation Power Analysis to abstracted the key of the SM4 with the trojan implanted to verify the validity of the trojan and the 8 bit of the first round round key was successfully extracted by using 15000 power consumption traces.2.We implemented ZUC steam cipher in hardware environment and built ZUC steam cipher power acquisition platform based on Sakura-G FPGA board.Then we proposed CPA attack scheme based on the selection of initial vector to abstract the 128 bit key information of the ZUC algorithm.We implemented the scheme and successfully extracted the 8bit key in the first round of algorithm initialization mode with only 3,000 power consumption traces,and proved the validity of the scheme.3.We proposed a new countermeasures based on random regisiter to resist the side channel analysis.Then we used the scheme in ZUC steam cipher and implemented it in hardware environment.We collected 100,000 power consumption traces and failed to reveal the secret key with CPA.The experiment proved that the scheme can effectively resist CPA attacks.
Keywords/Search Tags:SM4, ZUC, hardware circuit, Correlation power analysis, Hardware Trojan, Random regisiter
PDF Full Text Request
Related items