|
计算机应用研究 2012
Experimental implementation of DPA attacks on TDES design on smartcard
|
Abstract:
This paper used the correlation analysis method, and firstly conducted a successful DPA attacks on TDES hardware implementation. Experimental results show that for the simple power consumption models, correlation attacks provide good results and are extremely easy to manipulate. With the Hamming distance model, the lowest number of traces needed to successfully reveal the each round key is approximately 3 500 power traces. Meanwhile, the DPA attacks on TDES and DES are same because of their same implementation structure.