作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (24): 103-105. doi: 10.3969/j.issn.1000-3428.2011.24.034

• 安全技术 • 上一篇    下一篇

基于生物密钥系统的能量攻击分析

姚剑波 1,张 涛 2   

  1. (1. 遵义师范学院计算机科学系,贵州 遵义 563002;2. 中国电子科技集团公司第三十研究所卫士通公司,成都 610041)
  • 收稿日期:2011-06-21 出版日期:2011-12-20 发布日期:2011-12-20
  • 作者简介:姚剑波(1965-),男,博士、CCF高级会员,主研方向:信息安全;张 涛,博士
  • 基金资助:
    贵州省科学技术基金资助项目(黔科合J字2009(2275))

Power Attack Analysis Based on Biometric Cryptosystem

YAO Jian-bo 1, ZHANG Tao 2   

  1. (1. Department of Computer Science, Zunyi Normal College, Zunyi 563002, China; 2. Westone Corporation of No.30 Research Institute, China Electronics Technology Group Corporation, Chengdu 610041, China)
  • Received:2011-06-21 Online:2011-12-20 Published:2011-12-20

摘要: 为评估生物密钥系统在侧信道攻击下的安全性能,在分析生物密钥系统结构和特点的基础上,将用户的击键生物特征和秘密共享方案相结合,设计一个基于击键的安全生物密钥系统,并通过差分能量攻击技术测量安全生物密钥系统的功耗泄漏。仿真分析表明,攻击者借助少量的功耗泄露就可以破解生物密钥系统的信息。

关键词: 生物密钥系统, 侧信道攻击, 差分能量攻击, 功耗泄漏

Abstract: To assess the biometric cryptosystem performance in possible side-channel attacks, on the basis of analysis of the biometric cryptosystem structure and characteristics, a secure biometric cryptosystem based on the keystroke is designed by the combination of the user's keystroke biological characteristics and secret sharing scheme. Power consumption leakage of the safe biometric cryptosystem is measured with the Differential Power Attack(DPA). Simulation analysis shows the biometric cryptosystem can be extracted with bits of power leakages.

Key words: biometric cryptosystem, side-channel attack, Differential Power Attack(DPA), power consumption leakage

中图分类号: