作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (02): 6-8. doi: 10.3969/j.issn.1000-3428.2007.02.003

• 博士论文 • 上一篇    下一篇

基于时间随机化的密码芯片防攻击方法

韩 军,曾晓洋,汤庭鳌   

  1. (复旦大学专用集成电路与系统国家重点实验室,上海 201203)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-01-20 发布日期:2007-01-20

Modeling Timing Randomization in Cryptographic Chip Against Power Analysis Attack

HAN Jun, ZENG Xiaoyang, TANG Tingao   

  1. (State Key Laboratory of ASIC & System, Fudan University, Shanghai 201203)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-01-20 Published:2007-01-20

摘要: 差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。作为防御技术之一,将系统运行时间随机化是一种直接有效的方法。该文建立了随机时间延迟防御DPA攻击的理论模型,从而得到了随机时间延迟抑制DPA攻击的阈值条件。为了既保证较高的DPA防御能力,又能降低计算设备额外的时间负担,基于理论模型的结论研究了时间延迟的概率分布,得出了发生一次和两次随机时间延迟时,延迟变量最优的概率分布律。

关键词: 差分功耗分析攻击, 密码芯片防御技术, 时间随机化, 概率分布

Abstract: Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system. As an attractive countermeasure, inserting random time delay into device’s running process is a straightforward and effective method. This paper presents the theoretical modeling on timing randomization against power analysis attacks, and gives the threshold condition to resist DPA. In order to obtain the minimal amount of overhead, it investigates different probability distributions of random delay. The optimized probability distributions are proposed, when random delays are inserted one or two times.

Key words: Differential power analysis(DPA), Countermeasure for cryptographic chip, Timing randomization, Probability distribution