ECC处理器时间随机化抗DPA攻击设计

为了提高ECC密码处理器的抗差分能量攻击能力,提出了基于软中断的时间随机化抗差分能量攻击方法。首先分析了时间随机化抗DPA攻击的原理;然后结合ECC处理器的运算特征,设计了基于软中断的时间随机化电路;最后搭建了功耗仿真平台。对设计进行仿真分析,结果表明,本设计能够满足抵抗DPA攻击,同时时间随机化部分的功耗特性在能量迹上不易被区分剔除,达到了处理器抗DPA攻击的设计要求。...

Full description

Saved in:
Bibliographic Details
Published in电子技术应用 Vol. 41; no. 10; pp. 103 - 106
Main Author 陈琳 严迎建 周超 李默然
Format Journal Article
LanguageChinese
Published 解放军信息工程大学,河南郑州,450000 2015
Subjects
Online AccessGet full text
ISSN0258-7998
DOI10.16157/j.issn.0258-7998.2015.10.028

Cover

More Information
Summary:为了提高ECC密码处理器的抗差分能量攻击能力,提出了基于软中断的时间随机化抗差分能量攻击方法。首先分析了时间随机化抗DPA攻击的原理;然后结合ECC处理器的运算特征,设计了基于软中断的时间随机化电路;最后搭建了功耗仿真平台。对设计进行仿真分析,结果表明,本设计能够满足抵抗DPA攻击,同时时间随机化部分的功耗特性在能量迹上不易被区分剔除,达到了处理器抗DPA攻击的设计要求。
Bibliography:ECC ; cipher processor ; time randomization ; differential power attack ; soft interrupt
In order to improve the resistance to differential power attack capability of the ECC cryptographic processor, this paper presents the method of time randomization based on soft interrupt resistance to DPA attack. First the principle of the time randomization against DPA attack is analyzed; and then combined with the operational characteristics of ECC processor, this paper designs a time randomized circuit based on soft interrupt request; finally, power simulation platform is built and the design result is simulated. Simulation results show that the design can resist the DPA attack, and power characteristics of time randomization part in energy trace are not easy to be culled. The design achieves requirements of against DPA attack for ECC cryptographic processor.
Chen Lin, Yan Yingjian, Zhou Chao, Li Moran (PEA Information Engineering University, Zhengzhou 450000, China)
11-2305/TN
ISSN:0258-7998
DOI:10.16157/j.issn.0258-7998.2015.10.028