期刊文献+

针对AES第一轮的汉明重代数攻击研究 被引量:1

Research in HW Algebraic Attack on AES First Round
下载PDF
导出
摘要 将差分功耗分析的汉明重量模型与传统的代数攻击相结合,实现了针对128位密钥的AES密码算法第一轮的功耗代数攻击.在攻击实验中,改进了汉明重量函数,并证明了利用此函数能够通过进一步计算的相关系数r明显区分出正确密钥字节与错误密钥字节,在最短时间内获得正确的真实的全部密钥字节,对比其他同类研究更具适用性和高效性. Combine the Hamming-Weight model of DPA with traditional algebraic attack,and achieve the power algebraic attack on the first round of AES-128.In the attack experiment,improve the function of Hamming-Weight,and prove that it can evidently distinguish the right key bytes from the wrong ones by further computed correlation coefficient r,and then acquire all the true key bytes in certain time.It is experimentally proved that this method is more applicable and more effective than other corresponding research.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第7期82-85,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60772082) 河北省自然科学基金数学研究专项(08M010)
关键词 AES DPA Hamming-Weight 汉明重代数攻击 相关系数 AES DPA Hamming-Weight HW algebraic attack correlation coefficient
  • 相关文献

参考文献5

  • 1Mangard S. A simple power analysis(SPA) attack on implementations of the AES key expansion [ C ]// ICISC2002. Seoul, Korea: Lecture Notes in Computer Science, 2002 : 343-358.
  • 2Bogdanov A, Kizhvatov I, Pyshkin Pu Algebraic meth- ods in side--channel collision attacks and practical colli- sion detection[C]// Indocrypt2008. Kharagpur, India: LNCS, 2008: 51- 265.
  • 3Bogdanov A. Improved side--channel collision attacks on AES [C]// SAC2007. Ottawa, Canada.. LNCS, 2007 : 84- 95.
  • 4Renauld M, Standaert F -- X. Algebraic side-channel attacks[-EB/OL]. [2010-03-13]. Cryptology ePrint Archive, report 2009/179, http://eprint, iacr. org/ 2009/279.
  • 5Renauld M, Standaert F X, Veyrat Charvillon N. A1- gerbaic side--Channel Attacks on the AES: Why Time also Matters in DPA[C]// CHES 2009, Switzerland: Lecture Notes in Computer Science, 2009 : 97- 111.

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部