Computer Engineering and Applications ›› 2010, Vol. 46 ›› Issue (33): 82-84.DOI: 10.3778/j.issn.1002-8331.2010.33.022
• 网络、通信、安全 • Previous Articles Next Articles
ZHANG Jing-jing,LI Ren-fa,LI Lang,ZENG Qing-guang
Received:
Revised:
Online:
Published:
Contact:
章竞竞,李仁发,李 浪,曾庆光
通讯作者:
Abstract: Based on the principle of power leakage of CMOS chips,a simple and efficient power consumption model is presented,and a power analysis attack scheme for DES encryption algorithm is devised,and then the 48-subkey of DES encryption algorithm is cracked on this self-developed power analysis simulator.The result shows that DES encrypted systems without any extra protective measures have potential security problems.The simulator provides a simple,intuitionistic,fast and effective evaluation platform for the research of power analysis methods and anti-power analysis.Finally,the possible anti-power methods are analyzed.
摘要: 在分析CMOS芯片工作时功率消耗原理的基础上,提出一种简洁高效的功耗模型,设计一种针对DES加密算法的差分功耗攻击方案,并在自主开发的功耗分析仿真器上完成破解 DES加密算法中的48位子密钥,结果表明未加防护的DES加密系统存在安全隐患,该仿真器亦为功耗攻击方法及抗功耗攻击的研究提供一种简洁、直观、快速、有效的评估平台,最后对抗功耗攻击方法进行分析。
CLC Number:
TP393
ZHANG Jing-jing,LI Ren-fa,LI Lang,ZENG Qing-guang. Research and realization of simulation of DES differential power analysis attacks[J]. Computer Engineering and Applications, 2010, 46(33): 82-84.
章竞竞,李仁发,李 浪,曾庆光. DES差分功耗分析研究及仿真实现[J]. 计算机工程与应用, 2010, 46(33): 82-84.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2010.33.022
http://cea.ceaj.org/EN/Y2010/V46/I33/82