| 注册
首页|期刊导航|计算机工程|基于功耗泄漏的密码芯片指令分析

基于功耗泄漏的密码芯片指令分析

吴恒旭 陈开颜 邓高明 邹程

计算机工程2011,Vol.37Issue(7):130-132,135,4.
计算机工程2011,Vol.37Issue(7):130-132,135,4.DOI:10.3969/j.issn.1000-3428.2011.07.043

基于功耗泄漏的密码芯片指令分析

Instruction Analysis for Crypto Chip Based on Power Consumption Leakage

吴恒旭 1陈开颜 1邓高明 1邹程1

作者信息

  • 1. 军械工程学院计算机工程系,石家庄050003
  • 折叠

摘要

Abstract

This paper goes on modeling attack to chips by using power consumption side channel leak signal with the idea of reverse engineering and the method of Side Channel Attack(SCA), selects the effective instruction power consumption path to establish side channel template for instructions, and proposes partitioning method for instruction class. The single cycle and single-byte side channel template analysis against the instructions executed in a microcontroller AT89C52 validates the effective of the instructions reversing.

关键词

旁路攻击/模板攻击/逆向工程

Key words

Side Channel Attack(SCA)/ template attack/ reverse engineering

分类

信息技术与安全科学

引用本文复制引用

吴恒旭,陈开颜,邓高明,邹程..基于功耗泄漏的密码芯片指令分析[J].计算机工程,2011,37(7):130-132,135,4.

基金项目

国家自然科学基金资助项目(60571037) (60571037)

军械工程学院原始创新基金资助项(YSCX0903) (YSCX0903)

计算机工程

OACSCDCSTPCD

1000-3428

访问量0
|
下载量0
段落导航相关论文