Font Size: a A A

A Study In Power Analysis On Simulated Circuit With Mask Protection

Posted on:2017-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:K CaoFull Text:PDF
GTID:2428330590468182Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,the development of integrated circuit technology has established the technical foundation for the popularization of embedded system in daily life.But with the popularity of embedded system,its security problem also gets our attention,especially the influence of Side Channel Attack(SCA)which has developed rapidly in recent ten years.Power analysis is the most commonly used attack in SCA,but also one of the most effective attack methods.It use the leakage of cryptographic during operation,to find out the key or other secret information.Power attack is not only powerful,but also low cost,and protection against it is difficult.With the great threat to a cryptographic device of power analysis,this paper aims at researching the protection method of power analysis.Specifically,this research focuses on masking pretection of two widely used power analysis methods – the first order DPA and the second order DPA.For the protection against first order DPA,we proposed an method with mixture of masking protecting and hidding technology.During the algorithm processing,the real intermediate values are masked with a random mask.Also,we add some pseudo DES operation randomly,to increase the difficulty of curve preprocession and make the attacker hard to determine the attack position.For the protection against second order DPA,we take the mask protection for reference,then put forward a protective scheme with three shared secret factors.So that,whether an attacker gains which two values,the true value is difficult to be revealed.For these two protective scheme,we both used the analysis platform for the experimental test.The result of experiments shows that the two kinds of protection is reliable.
Keywords/Search Tags:Side Channel Attack, Power Analysis, Masking Protection
PDF Full Text Request
Related items