邓高明, 张鹏, 赵强, 陈开颜. 针对密码芯片的电磁模板分析攻击[J]. 微电子学与计算机, 2010, 27(1): 1-4,8.
引用本文: 邓高明, 张鹏, 赵强, 陈开颜. 针对密码芯片的电磁模板分析攻击[J]. 微电子学与计算机, 2010, 27(1): 1-4,8.
DENG Gao-ming, ZHANG Peng, ZHAO Qiang, CHEN Kai-yan. EM Template Analysis for Cipher Chips[J]. Microelectronics & Computer, 2010, 27(1): 1-4,8.
Citation: DENG Gao-ming, ZHANG Peng, ZHAO Qiang, CHEN Kai-yan. EM Template Analysis for Cipher Chips[J]. Microelectronics & Computer, 2010, 27(1): 1-4,8.

针对密码芯片的电磁模板分析攻击

EM Template Analysis for Cipher Chips

  • 摘要: 给出一种简单的电磁信号的获取办法, 说明密码芯片的电磁信号能够用一个手工绕制的金属线圈获取, 并且其信号幅度和操作数的汉明重量相关.在描述模板攻击原理和步骤的基础上, 介绍了针对密码芯片的电磁模板分析攻击, 并且针对一个单片机 (AT89C52) 上实现的DES密码系统进行了电磁模板分析攻击实验, 实验成功恢复了DES第16轮使用的48位子密钥.

     

    Abstract: In this paper, it is shown that the electromagnetic (EM) emanation of cryptographic chips could be captured easily with a handmade loop probe, and its amplitude is related to the hamming weight of the related operands.Based on the description of the principle and steps of template analysis, EM template analysis attack against cryptographic chips was introduced.Additionally, an experiment of EM template analysis attack against a singlechip (AT89C52) implemented DES was given, and the 48-bit subkey used in the 16th round of DES was recovered.

     

/

返回文章
返回