期刊文献+

基于PCA和SVM的电磁模板分析攻击 被引量:6

Electromagnetic Template Analysis with PCA and SVM
下载PDF
导出
摘要 在分析密码芯片电磁辐射数据相关性的基础上,提出了一种基于主成分分析(PCA)技术和多分类支持向量机(SVM)的模板分析密码旁路攻击方法。将密码设备运行时采集到的泄漏的电磁信号经过PCA处理之后作为特征向量,其对应的密钥作为类别,用已知密钥情况下获得的样本训练多分类SVM,用训练好的多分类SVM对未知密钥的电磁信号进行分类,并根据分类结果推测密钥值。实验表明,在用相同多个主成分和训练样本的条件下,SVM的分类效果好于大多数文献上使用的Bayes判别的分类效果。 Based on the introduction of the relationship between data being operated in a cipher device and the electromagnetic (EM) emission from it, a novel side channel crypto-analysis, electromagnetic template analysis with principle component analysis (PCA) and support vector machine (SVM) is proposed. In this method, eigenvectors were firstly extracted with PCA from EM signals captured while cipher device was executing, and then were used to train a multi-classify SVM combined with known secret keys as classes label, after that a sampie of EM signal with unknown secret key was classified with the trained multi-classify SVM, finally the secret key was deduced with the re suit of the SVM. It was confirmed with experiments that with the same number of principle components and training samples, the correct rate of SVM was higher than Bayes distinguish method which was widely used in published literatures.
出处 《计算机测量与控制》 CSCD 北大核心 2009年第9期1837-1839,1868,共4页 Computer Measurement &Control
基金 国家自然科学基金项目(60571037) 国家863计划项目(2007AA01Z454)
关键词 模板分析 电磁旁路攻击 主成分分析 支持向量机 template analysis electromagnetic side channel attack PCA SVM
  • 相关文献

参考文献7

  • 1Kocher P. Timing attacks on implementations of Diffie-- Hellman, RSA, DSS, and other systems [A], In Neal Koblitz, editor, Ad vances in Cryptology, Proceedings Crypto' 96, LCNS [C], New York: Springer--Verlag, 1996: 104--113.
  • 2Chari S, Rao J R, Rohatgi P. Template Attacks [A]. Burton S. Kaliski Jr. , C etin Kaya Koc, and Christof Paar, editors, Proceedings of CHES 2002 [C], LNCS, Springer, 2003: 13--28.
  • 3Archambeau C, Peeters E, Standaert F --X, et al. Quisquater. Template attacks in principal subspaces [A]. In Louis Goubin and Mitsuru Matsui, editors, Cryptographic Hardware and Embedded Systems -- CHES 2006 [C], volume 4249 of LNCS, Springer, 2006: 1--14.
  • 4Moulay Abdelaziz EL AABID, Sylvain Guilley, Philippe Hoogvorst. Template Attacks with a Power Model 2007 [EB/OL]. http: // eprint, iacr. org/2007/443.
  • 5International Eleetrotechnical Commission. IEC 61967: Integrated Circuits--Measurement of Electromagnetic Emanations, 150 kHz to 1 GHz. 2003[EB/OL], http: //www. iee. ch/.
  • 6Serway R A. Physics for scientists and engineers [M]. Saunders Golden sunburst series. Saunders college publishing, 1996.
  • 7Vapnik V. The nature of statistical learning theory [M]. New York: Springer--Verlag, 1999.

同被引文献18

  • 1Stefan Mangard,Elisabeth Oswald Thomas Popp.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2009,11.
  • 2T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Investigations of Power Analysis Attacks on Smartcards [EB/OL], http: // www. usenix, org/. 1999.
  • 3R. Bevan and E. Knudsen. Ways to Enhance DPA [A], International Conference on Information Security and Cryptology (ICISC 2002) [C, 2003. 327-342.
  • 4Joan Daemen and'Vincent Rijmen. The design of Rijndael: AES-- the advanced encryption standard IS]. Springer-Verlag, 2002.
  • 5Paul K. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[ C ]//1996 International Conference on Ad- vances in Cryptology, 1996,1109 : 104 - 113.
  • 6Paul K, Jaffe J, Jun B. Differential power analysis [ C ]//1999 Interna- tional Conference on Advances in Cryptology ( CRYPTO' 99 ) , 1999, 1666:388 - 397.
  • 7Gandolfi K, Mourte C, Olivier F. Electromagnetic analysis: concrete results [ C ]//2001 International Conference on Cryptographic Hardware and Embedded System( CHES' 01 ) ,2001,2162:251 - 261.
  • 8Suresh Chari, Josyula R Rao, Pankaj Rohatgi. Template Attacks [ C ]//Cryptographic Hardware and Embedded Systems ( CHES' 02 ) , 2002 : 13 - 28.
  • 9Dakshi Agrawal, Josyula R Rao, Pankaj Rohatgi, et al. Templates as Master Keys [ C ]//Cryptographic Hardware and Embedded Systems ( CHES' 05 ) ,2005 : 15 - 29.
  • 10Archambeau C, Peeters E, Standaert F X, et al. Template Attacks in Principal Subspaces [ C ]//Cryptographic Hardware and Embedded Systems ( CHES' 06 ), 2006 : 1 - 14.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部