Font Size: a A A

The Research Of Design On Power Analysis Attack Countermeasure Of Block Cipher Chips

Posted on:2016-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:J C YuFull Text:PDF
GTID:2308330482479180Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Power analysis attack is a great serious for the military cipher chips, which can obtain the key information by measuring and analyzing the correlation between data processing and power consumption during the running process of cryptographic devices. Power analysis attack countermeasure design has become a critical link for cryptographic security chip design. But it has drawbacks of low security strength, high resource utilization, high power consumption and poor universality, so this paper combined the operational characteristics of block cipher and targeting at security, efficiency and flexibility, conducted a research of power analysis attack countermeasure design on circuit-level, algorithm-level and system-level from the power axis, and conducted quantitative evaluation from the security aixs, to construct a block cipher that the security strength of power analysis attack countermeasure can be configured.Circuit level design, on the basis of analyzing the primary consumption leakage types of dual-rail logic circuit, combining the design target of high security strength, this paper proposed a new power constant logic circuit based on dual-rail logic. Related to the security vulnerability of conventional dual-rail logic circuit, a improvement LUT(Look-Up-Table) logic was designed and the MLBDL(Masked LUT Based Differential Logic) circuit was proposed which combines the improvement LUT with mask technique, used to design and replace S box or other critical cryptographic modules. The Hspice result shows the MLBDL circuit can completely eliminate the correlation between power consumption and data processing, to ensure the safety and reliability of cipher functional module.Algorithm level design, On the basis of analyzing finite field expansion theory, combining the design target of low resource utilization and low power consumption, a design scheme of power-randomized based on compound field masked was proposed. For the problems of high computational complexity and large critical path delay in the design of compound field byte-inverse, this paper adopted the idea of multiplexing critical module, proposed a improved compound field byte-inverse with masking algorithm, designed its hardware circuit, and designed a mask AES cipher chip on this basis, including data path design and control time design. Finally, the masked of AES cipher was verified by simulation and experimention, the power-randomized effect of compound field masked was evaluated.System level design, On the basis of analyzing power consumption measured platform architecture, combining the design target of high universality, a power consumption constant module based on current compensation circuit was proposed from the design view of power consumption constant in system-level. The current compensation circuit was consisted of a dynamic current detection module, a high linearity Iâ†'V transformation module, a high linearity Vâ†'I transformation module and so on, realized the function of accurate copy the current variation of cipher algorithm IP core. Finally, through UltraSim simulation proved its security, evaluated its area consumption.Quantitative evaluation, On the basis of analyzing the correlation between information theory and power analysis attack, a scheme for quantitative evaluation of power analysis attack countermeasure was proposed using information entropy and mutual information theory. The scheme started from the process of power analysis attack, taking information entropy as a quantitative evaluation index of the ―uncertainty‖ level of power consumption information, taking mutual information as a quantitative evaluation index of the ―uncertainty‖ reduction of key information in the process of counting and analyzing power consumption information, using the amount of correct key information entropy to construct a security quantitative value about mutual information, when mutual information of the speculation key is greater than the security quantitative value, the speculation key can be considered to correct guess key. Finally, taking the DPA attacks as an example, using the above quantitative evaluation scheme, compared the ability of power analysis attack countermeasure of DES cipher chip and AES cipher chip.
Keywords/Search Tags:Power Analysis Attack Countermeasure, Dual Rail Pre-charge Logic, Compound Field Masked, Current Compensation Circuit, Information Entropy, Mutual Information
PDF Full Text Request
Related items