登录 EN

添加临时用户

SM2硬件实现与侧信道安全性研究

Research on SM2 Hardware Implementation and SCA Security

作者:巴特
  • 学号
    2018******
  • 学位
    硕士
  • 电子邮箱
    bat******.cn
  • 答辩日期
    2021.05.17
  • 导师
    乌力吉
  • 学科名
    电子科学与技术
  • 页码
    80
  • 保密级别
    公开
  • 培养单位
    026 集成电路学院
  • 中文关键词
    SM2算法,ECC,SCA安全性,功率获取,标量乘法
  • 英文关键词
    SM2 Algorithm,ECC,SCA Security,Power acquisition,Scalar multiplication

摘要

近年来,用户信息已受到黑客的攻击,并已在Internet上发布,从而引起人们对敏感信息泄漏主题的关注。在信息时代,如何使信息更加私密和安全已成为热门话题。中国国家密码管理局于2010年发布了SM2公钥加密算法,该算法具有保护性高,签名短,计算速度快等优点,被广泛应用于金融卡安全技术中。能量分析攻击是旁路攻击分析方案中的关键代表,它对智能卡产品的安全性构成了重大威胁。本文选择国密SM2算法作为研究对象,并针对该算法的主要运算步骤完成了底层计算模块和标量乘法模块的抗侧信道攻击设计。 Modelsim用于模拟两种类型的标量乘方法和基础模块,而ISE工具用于合成标量乘计算模块 。通过创建软件和硬件协作网络并使用VCS仿真工具,完成了SM2算法签名和验证的整体功能仿真。通过使用SAKURA-G FPGA板作为功耗采集平台,分析收集的功耗曲线以获取数据,并进行SPA和DPA侧信道攻击,以验证设计的抗侧信道攻击措施的防护效果。实验结果表明,改进的原子块二进制标量乘法算法具有抗SPA的作用;改进的蒙哥马利标量乘法算法不仅具有抗SPA的作用,而且具有抗DPA的作用。由于本设计包含多种抵抗侧信道攻击的措施,未来可以扩展应用到加密设备上,以提高设备的安全性。

User information has been compromised by hackers and released on the Internet in recent years, drawing attention to the topic of sensitive information leakage. In the information age, how to make information more private and safer has become a hot topic. Cryptography Administration of China promulgated the SM2 public key cryptographic algorithm in 2010, which has the advantages of high protection, short signatures length and quick calculation speed, and is adopted in financial card security technology. The power analysis attack is the key representative in the side channel analysis scheme, which presents a significant threat to the privacy of smart card products. The SM2 algorithm is chosen as the research object, and the bottom-level computing module's anti-side-channel attack and the scalar multiplication module's anti-side channel attack are designed for the main steps in the algorithm that can be used for side-channel attacks. Modelsim is used to simulate two types of scalar multiplication methods and underlying modules, and ISE tools are used to synthesize scalar multiplication. The overall functional simulation of the signature and verification of the SM2 algorithm is realized by creating a software and hardware collaboration network and using VCS simulation tools.The SAKURA-G FPGA board was chosen to construct a power consumption acquisition platform, the collected power traces are analyzed for data, and SPA and DPA were performed to verify the design's anti-side channel effect. The experimental results show that the improved atomic block binary scalar multiplication algorithm has an anti-SPA effect, and the improved Montgomery scalar multiplication algorithm has not only anti-SPA but also anti-DPA effect. This design can be extended to cryptographic devices in the future to increase the security efficiency, since it includes a range of side channel attack countermeasures.