English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65317/65317 (100%)
Visitors : 21280945      Online Users : 522
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8629


    Title: 於8051單晶片上實作可防禦DPA攻擊之AES加密器;Implementation of AES Cryptosystem on 8051 Single-chip Controller against DPA
    Authors: 張吉天;Chi-Tan Chang
    Contributors: 資訊工程學系碩士在職專班
    Keywords: AES加密;簡單能量分析;差分能量分析;遮罩;DPA;masking;AES;SPA
    Date: 2004-07-19
    Issue Date: 2009-09-22 11:32:01 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 自從差分能量分析(DPA)的攻擊被宣布後,就有許多演算法提出許多的防禦對策,而對於安全的AES演算法來說,一種masking(遮罩)方法是被建議的,然而這masking方法又被發現有second order DPA的弱點,因此,本文研究目的就是在於提出有效的AES軟體對策,以防禦second order DPA攻擊,而本文提出了一種把明文masking兩次另外再以置換掉S-Box的方法作為對策,使這演算法對於修改的S-Box因而不須使用masking的方法,如此的加密不會增加程式的複雜性,而我們稱這種置換最初的S-Box叫等效的S-Box,而這等效的S-Box的產生方法,其實跟原來的那組S-Box產生方法一樣,而我們也於最後以8051單晶片實作展示了防禦結果,以證明其是可防禦DPA攻擊,因此本論文所提防禦方法也適合低成本的smart card的使用。 Many defensive countermeasures have been proposed by many algorithms since Differential Powder Analysis (DPA) attack was announced. For secure AES algorithm, there was weakness of second-order DPA in the proposed Masking method. In this paper, the effective AES software, which masks plain-text twice, the other to replace primitive S-Box to makes a defense against second-order DPA, is proposed. The algorithm needn’t use the Masking method to modify S-Box. Therefore, program’s complexity with encryption isn’t increased; to replace the primitive S-Box is called “random S-Box”. In fact, this random S-Box produces the same method as this primitive S-Box does. Finally, in order to prove that it can resist DPA attack, the defensive effect of 8051 micro-controller is shown. Hence, the proposed resistant method also suits the low-cost smart card.
    Appears in Collections:[資訊工程學系碩士在職專班 ] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown1073View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明