分析了DPA、B—DPA和M~DPA等三种差分功耗分析方法的原理;在FPGA内部采用并行设计与流水线设计方法实现了AES的密码电路,分别采用DPA、B—DPA和M~DPA三种方法对AES的FPGA电路实现进行了攻击;得出结论:M—DPA攻击方法能够很好地减少FPGA密码芯片的并行设计和流水线设计带来的不利影响,能够有效增大分析的信噪比,减少攻击的样本量,提高攻击的效率;M~DPA攻击方法相对于DPA和B—DPA攻击能够更加适用于FPGA密码芯片的功耗旁路分析。
This paper firstly declares the principle of the differential power analysis attack (DPA), multi--bit DPA (M--DPA), Bevan' s multi--bit DPA (B--DPA) technology. Then, we implement the AES circuit with parallel structures and pipeline structures in FPGA, and use DPA, B--DPA, M--DPA attacking the AES circuit. Thirdly, with experiment, it proves that M--DPA can lead to the success to attack the FPGA. Compare to DPA and B--DPA, M--DPA can reduce the amounts of samples and improve the signal noise ratio.