首页    期刊浏览 2025年07月16日 星期三
登录注册

文章基本信息

  • 标题:Way to counter the re­con­struc­tion of key block al­go­rithms for se­cu­rity analy­sis by the dy­nam­ics of power con­sump­tion
  • 本地全文:下载
  • 作者:Zyuzya A.A.
  • 期刊名称:Visnyk NTUU KPI : Informatics, Operation and Computer Science
  • 印刷版ISSN:0135-1729
  • 出版年度:2009
  • 卷号:50
  • 出版社:National Technical University of Ukraine
  • 摘要:The ar­ti­cle stud­ies power analy­sis key re­con­struc­tion meth­ods for cryp­to­graphic al­go­rithms. The analy­sis of ex­ist­ing soft­ware coun­ter­mea­sures for such types of at­tacks was done. A new power analy­sis ob­struc­tion method was pro­posed. It is based on pseudo par­al­lel data pro­cess­ing in time shar­ing mode. The method is char­ac­ter­ized by a sto­chas­tic switch­ing be­tween pro­ceed­ing blocks of data for ran­dom time lo­ca­tion of block pro­cess­ing stages. It sig­nif­i­cantly re­duces ef­fec­tive­ness of the power analy­sis key re­con­struc­tion meth­ods. Pro­posed method was im­ple­mented in soft­ware im­ple­men­ta­tion of GOST 28.147-89 cryp­to­graphic al­go­rithm. De­crease in per­for­mance of such mod­i­fied im­ple­men­ta­tion is less then via using other power analy­sis ob­struc­tion meth­ods.
国家哲学社会科学文献中心版权所有