高级检索
    李 浪, 李仁发, 童元满, 章竞竞, Edwin H-M Sha. 嵌入式加密芯片功耗分析攻击与防御研究进展[J]. 计算机研究与发展, 2010, 47(4): 595-604.
    引用本文: 李 浪, 李仁发, 童元满, 章竞竞, Edwin H-M Sha. 嵌入式加密芯片功耗分析攻击与防御研究进展[J]. 计算机研究与发展, 2010, 47(4): 595-604.
    Li Lang, Li Renfa, Tong Yuanman, Zhang Jingjing, Edwin H-M Sha. Development on Power Analysis Attack and Defense of Embedded Cipher Chip[J]. Journal of Computer Research and Development, 2010, 47(4): 595-604.
    Citation: Li Lang, Li Renfa, Tong Yuanman, Zhang Jingjing, Edwin H-M Sha. Development on Power Analysis Attack and Defense of Embedded Cipher Chip[J]. Journal of Computer Research and Development, 2010, 47(4): 595-604.

    嵌入式加密芯片功耗分析攻击与防御研究进展

    Development on Power Analysis Attack and Defense of Embedded Cipher Chip

    • 摘要: 功耗分析攻击成为嵌入式加密芯片的最大威胁,它破解密码芯片密钥比穷举法要快得多,是一种新的密钥攻击方法.对功耗分析攻击与防御成为近年来研究的热点问题,功耗分析模型是研究功耗攻击与防御的基础,在对功耗攻击模型研究进展进行评述后,分别对功耗分析攻击与防御进行综述,功耗攻击从简单功耗分析攻击、差分功耗分析攻击和高阶差分功耗分析攻击进行比较,防御从算法级和电路级进行对比,并对文献进行了分类整理.通过对国内外研究进展的总结和对比,为特定领域的嵌入式加密芯片提供抗功耗分析攻击解决方案,最后对进一步研究的问题进行了展望.

       

      Abstract: Power analysis attack has become one of the most serious threats to break embedded security chips. It can crack security chips much faster than exhaustive search methods. It is a new attack method of secret key. Power analysis attack and its defense have attracted much attention in recent years. First studied in this paper are the power models that can be used for power analysis attacks and defense. It is pointed out that the high-performance and general-purpose model of power analysis attacks remains a very important research in the current. Then the authors discuss various types of power analysis attack and defense techniques, beginning from simple power analysis attack, differential power analysis attack to high-order power analysis attack. The success rate of a high-order power analysis attack is higher than that of the others, but its time and complexity of calculating are higher. Defense techniques on the algorithm level and circuit-level are also presented. Algorithm level is flexible to achieve, easy to transplant, and the realization of circuit-level is difficult, but it can gain better defense. Through the discussion and comparison, this paper can help researchers design a proper solution to defend against various power analysis attacks for their particular embedded security chips, and they can also gain useful information about power analysis attacks. Finally, the future research direction on power analysis attack and defense is presented.

       

    /

    返回文章
    返回