城市地下空间工程中英文对照外文翻译文献
中英文对照外文翻译
(beplayapp体育下载含英文原文和中文翻译)
外文文献:
Correlation Power Analysis with a Leakage Modeakage model. Then we show that sound and efficient attacks can be conducted against unprotected implementations of many algorithms such as DES or AES. This study deliberately restricts itself to the scope of secret key cryptography although it may be extended beyond.
This paper is organized as follows: Section 2 introduces the Hamming distance model and Section 3 proves the relevance of the correlation factor. The model based correlation attack is described in Section 4 with the impact on the model errors. Section 5 addresses the estimation problem and the experimental results which validate the model are exposed in Section 6. Section 7 contains the comparative study with DPA and addresses more specifically the so-called ―ghost peaks‖ problem encountered by those who have to deal with erroneous conclusions when implementing classical DPA on the substitution boxes of the DES ?rst round: it is shown there how the proposed model explains many defects of the DPA and how the correlation power analysis can help in conducting sound attacks in optimal conditions. Our conclusion summarizes the advantages and drawbacks of CPA versus DPA and reminds that countermeasures work against both methods as well.
2 The Hamming Distance Consumption Model
Classically, most power analyses found in literature are based upon the Hamming weight model [13,16], that is the number of bits set in a data word. In a m-bit microprocessor, binary data is coded ∑-==1
02m j j j d D , with the bit values dj=0 or 1. Its Hamming weight is simply the number of bits set to 1,∑-==10)(m j j d D H Its integer values stand between 0 and m. If D contains m independent and uniformly distributed bits, the whole word has an average Hamming
weight 2/m H =μand a variance 4/2m H =σ. It is generally assumed that the data leakage through the power side-channel depends
城市地下空间工程中英文对照外文翻译文献 来自beplayapp体育下载www.apt-nc.com转载请标明出处.