%0 Journal Article
%T Experimental implementation of DPA attacks on TDES design on smartcard
智能卡芯片中TDES密码电路的差分功耗攻击
%A OU Hai-wen
%A LI Qi-rui
%A HU Xiao-bo
%A ZHAO Jing
%A
欧海文
%A 李起瑞
%A 胡晓波
%A 赵静
%J 计算机应用研究
%D 2012
%I
%X This paper used the correlation analysis method, and firstly conducted a successful DPA attacks on TDES hardware implementation. Experimental results show that for the simple power consumption models, correlation attacks provide good results and are extremely easy to manipulate. With the Hamming distance model, the lowest number of traces needed to successfully reveal the each round key is approximately 3 500 power traces. Meanwhile, the DPA attacks on TDES and DES are same because of their same implementation structure.
%K smartcard chip
%K correlation analysis technique
%K power consumption model
%K triple data encryption standard(TDES)
%K differential power analysis(DPA)
智能卡芯片
%K 相关性分析
%K 功耗模型
%K 三重加密标准
%K 差分功耗攻击
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=F950C016BC33E90197C10DE2BCF2D3D9&yid=99E9153A83D4CB11&vid=771469D9D58C34FF&iid=38B194292C032A66&sid=8B6586F75D2B256A&eid=0FBB0D015A3E9A88&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=6