...
首页> 外文期刊>International Journal of Computer Network and Information Security >Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA
【24h】

Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA

机译:使用基于汉明距离功率模型的测量和模拟功率迹线进行相关功率分析–攻击FPGA中的16位整数乘法器

获取原文
           

摘要

In many cases side channel attacks complexity are estimated by considering attack simulations only. Regarding this estimations, parameters of cryptographic devices are set so the attack is infeasible. This work shows that this approach to secure cryptographic equipment can be dangerous because real attacks can be much better than expected according to simulations. This observation is presented on very generic Correlation Power Attack using Hamming Distance Power Model. This attack is aimed against integer multiplier implemented in FPGA. In cryptography, an integer multiplier power consumption can sometimes be exploited to reveal a secret. Very often it is in asymmetric cryptography that is used in PKI as a fundamental building block. As an example, there are DSA and its various derivations.
机译:在许多情况下,仅通过考虑攻击模拟来估算侧信道攻击的复杂性。关于该估计,设置了密码设备的参数,因此攻击是不可行的。这项工作表明,这种保护密码设备安全的方法可能很危险,因为根据模拟,实际攻击可能比预期的要好得多。使用汉明距离功率模型对非常通用的相关功率攻击进行了介绍。这种攻击的目的是针对在FPGA中实现的整数乘法器。在密码术中,有时可以利用整数乘法器功耗来揭示秘密。通常,非对称密码学在PKI中用作基本构件。例如,有DSA及其各种派生。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号