计算机应用研究2012,Vol.29Issue(3):927-929,3.DOI:10.3969/j.issn.1001-3695.2012.03.035
智能卡芯片中TDES密码电路的差分功耗攻击
Experimental implementation of DPA attacks on TDES design on smartcard
欧海文 1李起瑞 2胡晓波 1赵静2
作者信息
- 1. 西安电子科技大学通信工程学院,西安710071
- 2. 北京电子科技学院,北京100070
- 折叠
摘要
Abstract
This paper used the correlation analysis method, and firstly conducted a successful DPA attacks on TDES hardware implementation. Experimental results show that for the simple power consumption models, correlation attacks provide good results and are extremely easy to manipulate. With the Hamming distance model, the lowest number of traces needed to successfully reveal the each round key is approximately 3 500 power traces. Meanwhile, the DPA attacks on TDES and DES are same because of their same implementation structure.关键词
智能卡芯片/相关性分析/功耗模型/三重加密标准/差分功耗攻击Key words
smartcard chip/ correlation analysis technique/ power consumption model/ triple data encryption standard (TDES) / differential power analysis( DPA)分类
信息技术与安全科学引用本文复制引用
欧海文,李起瑞,胡晓波,赵静..智能卡芯片中TDES密码电路的差分功耗攻击[J].计算机应用研究,2012,29(3):927-929,3.