期刊文献+

针对密码芯片的自适应选择明文旁路模板分析

Adaptive chosen plaintext template analysis against cipher chips
原文传递
导出
摘要 为了提高旁路模板分析密钥恢复攻击的效率,提出一种自适应选择明文旁路模板分析方法.该方法选择密码算法中密钥参与的异或操作为攻击点,以两个操作数的汉明距离构建旁路信号模板,从二进制位为全'1'的明文开始,按选择明文与密钥的汉明距离不断减小的方向每次改变选择明文得到一个比特位,将选择明文逐步逼近并最终恢复密钥.针对微控制器AT89C52)上实现的高级加密标准密码算法攻击实验表明该方法可在不增加攻击所需样本的条件下提高攻击效率. To improve the efficiency of side channel template based key recover attack, an adaptive chosen plaintext template analysis method is presented. This method takes the exclusive or (XOR) operation between plaintext and secret key in cipher as attacking target, builds side channel templates for the Hamming distance between two operands. From a chosen plaintext whose binary bits are all "1", the binary bits in the chosen plaintext are changed bit by bit to reduce the Hamming distance between the plaintext and the key. Till the Hamming distance between the chose plaintext and the key is reduced to zero, the secret key should be equal to the plaintext. Attack experiment against advanced encryption standard (AES) encryption executed in an AT89C52 microcontroller shows that the attack efficiency is improved while the number of side channel samples holds in the level in traditional method.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第11期55-59,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60940019) 国家高技术研究发展计划资助项目(2007AA01Z454) 军械工程学院原始创新基金资助项目(YSCX0903)
关键词 密码学 密码芯片 微控制器 模板分析 汉明距离 自适应选择明文 高级加密标准 cryptography cipher chips microcontrollers template analysis Hamming-distance adaptive-chosen plaintexts advanced encryption standard (AES)
  • 相关文献

参考文献10

  • 1Chari S, Rao J R, Rohatgi P. Template attacks[C]// Proceedings of Cryptographic Hardware and Embed- ded Systems ( CHES 2003 ). Cologne.. Springer, 2003: 13-28.
  • 2邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16
  • 3褚杰,赵强,丁国良,邓高明.密码系统差分功耗分析攻击及功耗模型[J].华中科技大学学报(自然科学版),2008,36(6):18-21. 被引量:7
  • 4Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model [C] // Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2004), LNCS 3156. Berlin.. Springer, 2004; 16-29.
  • 5Agrawal D, Rao J R, Rohatgi P, et al. Templates as master keys [ C] // Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2005 ). Edinburgh.. Springer, 2005: 15-29.
  • 6李翔宇,孙义和.CMOS门电路的功率与数据相关性[J].清华大学学报(自然科学版),2005,45(7):985-988. 被引量:2
  • 7Rabaey J M,Chandrakasan A,Nikolic B.数字集成电路-电路、系统与设计[M].2版.周润德,译.北京:电子工业出版社,2004.
  • 8KangSung-Mo,LeblebiciY.CMOS数字集成电路--分析与设计[M].3版.王志功,窦建华,译.北京:电子工业出版社,2005.
  • 9Rechberger C, Oswald E. Practical template attacks [C] // Proceedings of Information Security Applica- tions, 5th International Workshop(WISA 2004). Jeju Island: Springer, 2004: 443-457.
  • 10National Institute of Standards and Technology. FIPS-197 Advanced encryption standard [S]. Gaithersburg.. National Institute of Standards and Technology, 2001.

二级参考文献36

  • 1李翔宇,孙义和.CMOS门电路的功率与数据相关性[J].清华大学学报(自然科学版),2005,45(7):985-988. 被引量:2
  • 2韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 3韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 4韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 5Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and countermeasures for smart cards// Proceedings of the Smart Cards Programming and Security (e-Smart 2001). Cannes, France, 2001: 200-210
  • 6Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results//Proceedings of the Workshop on Crypto graphic Hardware and Embedded Systems (CHES'01). Paris, France, 2001:251-261
  • 7Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side channel(s): Attacks and assessment methodologies// Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02). Redwood Shores, CA, USA, 2002:29-45
  • 8Chari S, Rao J R, Rohatgi P. Template attacks//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 03). Cologne, Germany, 2003 13-28
  • 9Agrawal D, Rao J R, Rohatgi P, Schramm K. Templates as master keys//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES' 05). Edinburgh, UK, 2005: 15-29
  • 10Archambeau C, Peeters E, Standaert F X, Quisquater J J. Template attacks in principal subspaces//Proeeedings of the Workshop on Cryptographie Hardware and Embedded Systems (CHES'06). Yokohama, Japan, 2006, 1-14

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部