Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (33): 82-84.DOI: 10.3778/j.issn.1002-8331.2010.33.022

• 网络、通信、安全 • Previous Articles     Next Articles

Research and realization of simulation of DES differential power analysis attacks

ZHANG Jing-jing,LI Ren-fa,LI Lang,ZENG Qing-guang   

  1. Institute of Computer and Communication,Hunan University,Changsha 410082,China
  • Received:2009-04-02 Revised:2009-06-02 Online:2010-11-21 Published:2010-11-21
  • Contact: ZHANG Jing-jing

DES差分功耗分析研究及仿真实现

章竞竞,李仁发,李 浪,曾庆光   

  1. 湖南大学 计算机与通信学院,长沙 410082
  • 通讯作者: 章竞竞

Abstract: Based on the principle of power leakage of CMOS chips,a simple and efficient power consumption model is presented,and a power analysis attack scheme for DES encryption algorithm is devised,and then the 48-subkey of DES encryption algorithm is cracked on this self-developed power analysis simulator.The result shows that DES encrypted systems without any extra protective measures have potential security problems.The simulator provides a simple,intuitionistic,fast and effective evaluation platform for the research of power analysis methods and anti-power analysis.Finally,the possible anti-power methods are analyzed.

摘要: 在分析CMOS芯片工作时功率消耗原理的基础上,提出一种简洁高效的功耗模型,设计一种针对DES加密算法的差分功耗攻击方案,并在自主开发的功耗分析仿真器上完成破解 DES加密算法中的48位子密钥,结果表明未加防护的DES加密系统存在安全隐患,该仿真器亦为功耗攻击方法及抗功耗攻击的研究提供一种简洁、直观、快速、有效的评估平台,最后对抗功耗攻击方法进行分析。

CLC Number: