ECC处理器时间随机化抗DPA攻击设计
为了提高ECC密码处理器的抗差分能量攻击能力,提出了基于软中断的时间随机化抗差分能量攻击方法。首先分析了时间随机化抗DPA攻击的原理;然后结合ECC处理器的运算特征,设计了基于软中断的时间随机化电路;最后搭建了功耗仿真平台。对设计进行仿真分析,结果表明,本设计能够满足抵抗DPA攻击,同时时间随机化部分的功耗特性在能量迹上不易被区分剔除,达到了处理器抗DPA攻击的设计要求。...
Saved in:
Published in | 电子技术应用 Vol. 41; no. 10; pp. 103 - 106 |
---|---|
Main Author | |
Format | Journal Article |
Language | Chinese |
Published |
解放军信息工程大学,河南郑州,450000
2015
|
Subjects | |
Online Access | Get full text |
ISSN | 0258-7998 |
DOI | 10.16157/j.issn.0258-7998.2015.10.028 |
Cover
Summary: | 为了提高ECC密码处理器的抗差分能量攻击能力,提出了基于软中断的时间随机化抗差分能量攻击方法。首先分析了时间随机化抗DPA攻击的原理;然后结合ECC处理器的运算特征,设计了基于软中断的时间随机化电路;最后搭建了功耗仿真平台。对设计进行仿真分析,结果表明,本设计能够满足抵抗DPA攻击,同时时间随机化部分的功耗特性在能量迹上不易被区分剔除,达到了处理器抗DPA攻击的设计要求。 |
---|---|
Bibliography: | ECC ; cipher processor ; time randomization ; differential power attack ; soft interrupt In order to improve the resistance to differential power attack capability of the ECC cryptographic processor, this paper presents the method of time randomization based on soft interrupt resistance to DPA attack. First the principle of the time randomization against DPA attack is analyzed; and then combined with the operational characteristics of ECC processor, this paper designs a time randomized circuit based on soft interrupt request; finally, power simulation platform is built and the design result is simulated. Simulation results show that the design can resist the DPA attack, and power characteristics of time randomization part in energy trace are not easy to be culled. The design achieves requirements of against DPA attack for ECC cryptographic processor. Chen Lin, Yan Yingjian, Zhou Chao, Li Moran (PEA Information Engineering University, Zhengzhou 450000, China) 11-2305/TN |
ISSN: | 0258-7998 |
DOI: | 10.16157/j.issn.0258-7998.2015.10.028 |