Font Size: a A A

Research On DPA Attack And Protection Based On AES Encryption Algorithm Of SOC Chip

Posted on:2021-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:S Y ZhengFull Text:PDF
GTID:2428330626462365Subject:Integrated circuit engineering
Abstract/Summary:PDF Full Text Request
During the execution of the cryptographic algorithm,it must rely on the cryptographic equipment to implement the cryptographic algorithm using software or hardware.During the operation of these cryptographic devices,"side information" is always generated,such as energy consumption,electromagnetic radiation,etc.These side information poses a significant hidden danger to the security of cryptographic devices.The power analysis attack is a method of collecting energy information during the operation of the cryptographic algorithm to analyze and decrypt the secret information.The energy analysis attack has the characteristics of obvious attack effect,low cost,and simple attack method,which seriously threatens the cryptographic equipment.Security.The full name of the AES algorithm is Advanced Encryption Standard,which is the advanced encryption standard.It was published by the National Institute of Standards and Technology(NIST)on FIPS PUB 197 on November 26,2001,and became an effective standard on May 26,2002,and still in use today,is one of the most widely used block encryption algorithms.This article relies on the power attack platform to conduct differential power analysis(DPA)research on secure smart card devices using SOC chip-based soft implementation of AES encryption algorithm.Systematic experiments and researches are carried out on the power trace pre-processing,power leakage model and attack method selection involved in the DPA attack.It also implements first-order DPA attacks,DPA attacks using out-of-order hiding strategy algorithms,and second-order DPA attacks using mask protection strategies.This paper designs and implements an anti-DPA attack scheme suitable for the AES encryption algorithm of the secure SOC chip.For the software-implemented AES encryption mask scheme,this paper analyzes the security and performance of the improved cyclic shift S-Box mask(RSM2.0),and adds protection methods for the middle value of this scheme that is vulnerable to DPA attacks.The intermediate valuethat is not easy to attack uses a lower protection strategy to improve performance.Design a safe,efficient and lightweight protection scheme.For the hardware-implemented AES encryption mask scheme,this paper uses a Boolean mask S-Box scheme on the complex domain arithmetic to convert the operations on the galois field GF(28)to GF(22)Operation.At the same time,the random number stream is used to participate in the operation of the S box,so that the mask values of the input and output of the S box are different and independent of each other.To increase the ability to resist second-order DPA attacks.Based on the0.11?m CMOS technology,the hardware AES mask scheme implemented in this paper has a continuous encryption throughput of about 1.04 Gbps.
Keywords/Search Tags:information security, AES algorithm, power attack, second-order DPA, masking technology, Galois Field
PDF Full Text Request
Related items