Базові логічні елементи для комп'ютерних пристроїв захисту інформації

Authors: 

Коркішко Л.М.

Тернопільський державний економічний університет, кафедра безпеки інформаційних технологій

Запропоновано узагальнений параметризований метод для побудови базових логічних елементів (логічного множення та додавання), призначених для використання у комп’ютерних пристроях захисту інформації.

1. Kelsey J., Schneier B., Wagner D., Hall C., Side Channel Cryptanalysis of Product Ciphers // In 5th European Symposium on Research in Computer Security – ESORICS ‘98, vol. 1485 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 1998. – P. 97–110. 2. Clavier C., Coron J.-S., Dabbous N., Differential power analysis in the presence of hardware countermeasures / C.K. Koc, C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHESS 2000, vol. 1956 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 2000. – P. 252–263. 3. Kocher P., Jaffe J., Jun B., Differential Power Analysis // In proceedings of International conference CRYPTO’99, vol. 1666 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 1999. – P. 388–397. 4. Messerges T., Dabbish E., Sloan R., Eximining smart-card security under the threat of power analysis attack // IEEE Transactions on computers. – 2002. – Vol. 51, No 5. – P. 541–552. 5. Messerges T., Dabbish E., Sloan R., Power analysis attacks of modular exponentiation in smartcards / C.K. Koc, C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHESS 1999, vol. 1717 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 1999. – P. 144–157. 6. Akkar, M., Giraud, C. An implementation of DES and AES, secure against some attacks // In Proc. Cryptographic Hardware and Embedded Systems – CHES 2001, volume 2162 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 2001. – P. 309–318. 7. Akkar M., Bevan R., Dischamp P., Moyart D., Power analysis, what is now possible / T. Okamoto, Eds., International conference ASIACRYPT 2000, vol. 1976 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 2000. – P. 489–502. 8. Messerges T., Using second-order power analysis to attack DPA resistant software / C.K. Koc, C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHESS 2000, vol. 1956 of Lecture Notes in Computer Science. – Springer-Verlag Berlin Heidelberg, 2000. – P. 238–251. 9. Lv J., Han Y., Enhanced DES Implementation Secure against High-Order Differential Power Analysis in Smartcards // In Proceedings of ACISP’05 – Tenth Australian Conference on Information Security and Privacy, Volume 3574 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, 2005. – P. 195–206. 10. Oswald E., Mangard S., Herbst C., Tillich S., Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers // In Proc. CT-RSA 2006, Vol. 3860 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, 2006 – P. 192–207. 11. Shin J.H., Park D.J., Lee P. J., DPA attack on the Improved Ha-Moon Algorithm // In Proc. Information Security Applications, 6th International workshop – WISA 2005, vol. 3786 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, 2006. – P. 283–291. 12. Katsuyuki O., Kouichi S., A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks, Lecture Notes in Computer Science, Volume 2433 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, 2002. – 112 Lviv Polytechnic National University Institutional Repository http://ena.lp.edu.ua P. 389–401. 13. Koecher et al., Using Unpredictable Information to Minimize Leakage from Smartcards and other Cryptosystems., USA patent 6327661., Dec. 4, 2001. – 14 p. 14. Trichina E., Korksihko T., Secure AES Hardware Module for Resource Constrained Devices, // Lecture Notes in Computer Science, Vol. 3313, Springer-Verlag Berlin Heidelberg, 2005. – P. 215–229. 15. Черкаський М. Складність апаратно-програмних комп’ютерних засобів // Сучасні проблеми в комп’ютерних науках. Contemporary Computing in Ukraine CCU’2000: Зб. наук. праць. – Львів, 2000. – С. 58–67.