Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2007, Vol. 33 ›› Issue (02): 6-8. doi: 10.3969/j.issn.1000-3428.2007.02.003

• Degree Paper • Previous Articles     Next Articles

Modeling Timing Randomization in Cryptographic Chip Against Power Analysis Attack

HAN Jun, ZENG Xiaoyang, TANG Tingao   

  1. (State Key Laboratory of ASIC & System, Fudan University, Shanghai 201203)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-01-20 Published:2007-01-20

基于时间随机化的密码芯片防攻击方法

韩 军,曾晓洋,汤庭鳌   

  1. (复旦大学专用集成电路与系统国家重点实验室,上海 201203)

Abstract: Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system. As an attractive countermeasure, inserting random time delay into device’s running process is a straightforward and effective method. This paper presents the theoretical modeling on timing randomization against power analysis attacks, and gives the threshold condition to resist DPA. In order to obtain the minimal amount of overhead, it investigates different probability distributions of random delay. The optimized probability distributions are proposed, when random delays are inserted one or two times.

Key words: Differential power analysis(DPA), Countermeasure for cryptographic chip, Timing randomization, Probability distribution

摘要: 差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。作为防御技术之一,将系统运行时间随机化是一种直接有效的方法。该文建立了随机时间延迟防御DPA攻击的理论模型,从而得到了随机时间延迟抑制DPA攻击的阈值条件。为了既保证较高的DPA防御能力,又能降低计算设备额外的时间负担,基于理论模型的结论研究了时间延迟的概率分布,得出了发生一次和两次随机时间延迟时,延迟变量最优的概率分布律。

关键词: 差分功耗分析攻击, 密码芯片防御技术, 时间随机化, 概率分布