期刊文献+

一种基于选择明文-时间差异的边信道攻击方法

A Side-Channel Attack Method Based on Chosen Plaintext-Timing Difference
下载PDF
导出
摘要 为了研究密码算法的安全性能,提出了一种基于选择明文-时间差异的边信道攻击(简称选择明文-时间攻击)方法.该方法通过选择少量适当的明文输入密码系统,检测相应部分代码的执行时间,从而分析获取密钥,用来攻击分组密码或公钥密码系统.为了便于说明,文中以分组密码DES算法为例,详述了选择明文-时间攻击的具体实现.在单片机上的实验结果表明,文中所提方法是可行的和有效的.文中最后分析了密码算法实现中普遍存在的执行时间差异的原因,并给出了相应的抵抗措施. Proposed in this paper is a side-channel attack method based on chosen plaintext-timing difference.This method,which is called chosen plaintext-timing attack for short and is adopted to evaluate the security of cryptography algorithms,extracts the secret key by selecting a few appropriate plaintexts which are sent to the cryptosystem and by measuring the execution time of the corresponding code,and uses the secret key to attack block cryptosystem and public cryptosystem.Moreover,DES block cipher algorithm is taken as an example to explain the implementation of the chosen plaintext-timing attack.Experimental results on a microcontroller unit indicate that the proposed attack method is effective and practical.In addition,the reason for the execution time diffe-rence existing in cryptosystem implementation is analyzed,and the corresponding countermeasures are presented.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期100-107,共8页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60772136) 国家"十一五"科技支撑计划项目(2008BAH22B03 2007BAH08B01) 国家"111"计划项目(B08038)
关键词 密码学 数据安全 边信道攻击 选择明文-时间攻击 DES算法 cryptography data security side-channel attack chosen plaintext-timing attack DES algorithm
  • 相关文献

参考文献12

  • 1Bar-EI Hagai. Introduction to side channel attacks [ EB/OL]. [2009-07-161]. http: //www. discretix, com/PDF/Introduction% 20to% 20Side% 20Channe1% 20Attacks. pdf.
  • 2Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [ M ]//Advances in Cryptology. Berlin/Heidelberg : Springer-Verlag, 1996 : 104-113.
  • 3Hevia A,Kiwi M. Strength of two data encryption standard implementations under timing attacks [C] //Proceedings of the Third Latin American Symposium on Theoretical Informaties. Berlin/Heidelberg : Springer-Verlag, 1998 : 192-205.
  • 4Mangard Stefan, Oswald Elisabeth, Popp Thomas. Power analysis attacks: revealing the secrets of smart cards [ M ]. Berlin/Heidelberg : Springer-Verlag, 2007:6-12.
  • 5Chu Jie, Zhao Qiang, Ding Guoliang, et al. Differential power analysis for cryptographic ICs [ C ] J/Proceedings of International Conference on Electronic Measurement & Instruments. Xi'an : IEEE, 2007:292-295.
  • 6Gandolfi Karine, Mourtel Christophe, Olivier Francis. Electromagnetic analysis : concrete results [ C ] //Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. Berlin/Heidelberg:Springer-Verlag,2001:251-261.
  • 7Quisquater Jean-jacques, Samyde David. Electromagnetic analysis (EMA) :measures and counter-measures for smart cards [C]//Proceedings of International Confe-rence on Research in Smart Cards. Berlin/Heidelberg: Springer-Verlag ,2001:200-210.
  • 8李玮,谷大武.基于密钥编排故障的SMS4算法的差分故障分析[J].通信学报,2008,29(10):135-142. 被引量:23
  • 9张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:66
  • 10王美一,唐学海,李超,屈龙江.3D密码的Square攻击[J].电子与信息学报,2010,32(1):157-161. 被引量:14

二级参考文献40

  • 1张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:66
  • 2KELSEY J, SCHNE/ER B, WANGNER D, et al. Side channel crypt-analysis of product ciphers[A]. The European Symposium on Research in Computer Security-ESORICS '98[C]. Louvain-la-Neuve, Belgium, 1998.97-110.
  • 3BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[A]. EUROCRYPT'97[C]. Konstanz, Germany, 1999.37-51.
  • 4KOCHER C P. Timing analysis on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. CRYPTO'96[C]. Santa Barbara, California, 1996. 204-223.
  • 5KOCHER C P, JAFFE J, JUN B. Differential power analysis[A]. CRYPTO'99[C]. 1999.388-397.
  • 6BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[A]. CRYPTO'97[C]. Santa Barbara, California, USA, 1997. 523-525.
  • 7BIEHL I, MEYER B, MULLER V. Differential fault analysis on elliptic curve cryptosystems[A]. CRYPTO 2000[C]. Santa Barbara, California, 2000. 232-246.
  • 8BLOMER J, SEIFERT J E Fault based cryptanalysis of the advanced encryption standard (AES)[A]. Financial Cryptography-FC 2003[C]. Guadeloupe, French West Indies, 2003. 162-181.
  • 9GIRAOUD C. DFA on AES[A]. Advanced Encryption Standard-AES[C]. Berlin, 2005.27-41.
  • 10CHEN C N, YEN S M. Differential fault analysis on AES key schedule and some countermeasures[A]. Proceedings of the Australasian Conference on Information Security and Privacy-ACISP 2003[C]. Wollongong, Australia, 2003. 118-129.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部