The server is under maintenance between 08:00 to 12:00 (GMT+08:00), and please visit
later.
We apologize for any inconvenience caused
DPA Attacks on Transformed Masking Method
Author(s): LI Qi-rui1, 2, 3, HU xiao-bo3 ZHAO jing1, 2 OU Hai-wen1, 2, 1.Institute of Telecommunication Engineering, Xi’dian University, Xi’an Shaanxi 710071, P.R.China 2.CEC Huada Electronic Design Co., Ltd, Beijing 100102, P.R.China 3.Beijing Electronic Science and Technology Institute, Beijing 100070, P.R.China
Pages: 35-
41
Year: 2011
Issue:
4
Journal: Beijing Electronics
Keyword: 智能卡芯片; 相关性分析; 掩码技术; 三重加密标准; 差分功耗攻击;
Abstract: 自1999年Kocher等人提出针对智能卡中DES的差分功耗攻击(DPA)以来,针对DPA的各种防御策略也被大量的提出,Masking就是其中一种简单、高效的方法。文献[2]中Akkar提出了一种改进的Masking方法,然而,本文基于实际的智能卡芯片对该方法成功进行了攻击试验。实验结果表明该方法并不能抵抗DPA的攻击。以此类推,文献[7]中提出的仅对密钥K进行掩码的方法亦不能抵抗DPA的攻击。
Citations
No citation found
Related Articles
No related articles found