Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2011, Vol. 37 ›› Issue (7): 130-132,135. doi: 10.3969/j.issn.1000-3428.2011.07.043

• Networks and Communications • Previous Articles     Next Articles

Instruction Analysis for Crypto Chip Based on Power Consumption Leakage

WU Heng-xu, CHEN Kai-yan, DENG Gao-ming, ZOU Cheng   

  1. (Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China)
  • Online:2011-04-05 Published:2011-03-31

基于功耗泄漏的密码芯片指令分析

吴恒旭,陈开颜,邓高明,邹 程   

  1. (军械工程学院计算机工程系,石家庄 050003)
  • 作者简介:吴恒旭(1983-),男,硕士研究生,主研方向:信息安全; 陈开颜,副教授、博士;邓高明、邹 程,博士
  • 基金资助:
    国家自然科学基金资助项目(60571037);军械工程学院原始创新基金资助项目(YSCX0903)

Abstract: This paper goes on modeling attack to chips by using power consumption side channel leak signal with the idea of reverse engineering and the method of Side Channel Attack(SCA), selects the effective instruction power consumption path to establish side channel template for instructions, and proposes partitioning method for instruction class. The single cycle and single-byte side channel template analysis against the instructions executed in a microcontroller AT89C52 validates the effective of the instructions reversing.

Key words: Side Channel Attack(SCA), template attack, reverse engineering

摘要: 结合逆向工程思想和旁路攻击原理,利用密码芯片的旁路功耗泄漏信号对芯片指令进行建模攻击,选取指令功耗轨迹上的有效点建立指令旁路模板,并提出指令类划分方法。通过对AT89C52单片机上运行的单周期单字节指令进行分析,验证了旁路模板指令恢复的可行性。

关键词: 旁路攻击, 模板攻击, 逆向工程

CLC Number: