期刊文献+

差分能量攻击样本选取方法 被引量:3

Samples selection method of differential power attack against advanced encryption standard
下载PDF
导出
摘要 为了解决差分能量攻击(DPA)中的样本选取问题,提出了一套样本选取方法。方法从所使用的实验平台出发,通过理论分析提出样本选取方式和数量,然后进行实验验证。以AES算法为例,分别进行了仿真实验和实测实验,验证了所提出的选取方法的准确性。结果表明,仿真攻击的明文样本应该按顺序取,数量为一个全排列,而实测攻击应该直接采用大量随机数,两者对明文样本的要求存在较大差别。 To resolve the problem with selecting the samples in the Differential Power Attack(DPA),this paper proposed a set of samples selection method.Based on the given experimental platform,the mode and amount of samples selection were proposed through theoretical analysis,and then were validated by experiments.For Advanced Encryption Standard(AES),this paper put forward the samples selection methods for simulation test and practical experimentation,and proved that the proposed method was right.The results show that the simulation sample plaintext attack should be taken in sequence,with the quantity of a full array.And the attack should be measured directly using a large number of random numbers.There is a big difference in the explicit requirements of the sample.
出处 《计算机应用》 CSCD 北大核心 2012年第1期92-94,118,共4页 journal of Computer Applications
关键词 差分能量攻击 样本选取 功耗曲线 高级加密标准 Differential Power Attack(DPA) samples selection power trace Advanced Encryption Standard(AES)
  • 相关文献

参考文献12

  • 1KOCHER P, JAFFE J, JUN B. Differential power analysis [C]// Advances in Cryptology - CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999:388 -397.
  • 2STANDAERT F-X, MALKIN T G, YUNG M. A unified framework for the analysis of side-channel key recovery attacks [ C ]// EUROCRYPT'09: Proceedings of the 28th Annual International Conference on Advances in Cryptology: The Theory and Applications of Cryptographic Techniques, LNCS 5479. Berlin: Springer-Verlag,2009:443 -461.
  • 3Ren Fang Yan Yingjian Fu Xiaobing.DESIGN OF DIFFERENTIAL POWER ANALYSIS RESISTANT CRYPTO CHIP BASED ON TIME RANDOMIZATION[J].Journal of Electronics(China),2010,27(2):237-242. 被引量:1
  • 4曾永红,叶旭鸣.抗差分功耗分析攻击的AES S盒电路设计[J].计算机工程,2010,36(9):20-22. 被引量:3
  • 5刘海清,陆洪毅,童元满.基于随机掩码的AES算法抗DPA攻击硬件实现[J].信息网络安全,2008(11):51-54. 被引量:1
  • 6GUILLEY S, HOOGVORST P, PACALET R. Differential power analysis model and some results [ C]//Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TCS/ WG8.8 & TCll/WGI1.2 Sixth International Conference on Smart Card Research and Advanced Applications. Norwell: Kluwer Academic Publishers, 2004:127 - 142.
  • 7MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 8LET H, CLEDIERE J, SERVIERE C, et al. Noise reduction in side channel attack using fourth-order cumulant [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(4): 710-720.
  • 9PARK J, LEE H, HA J, et al. A differential power analysis attack of block cipher based on the Hamming weight of internal operation unit [C]// Proceedings of 2006 International Conference on Computational Intelligence and Security, LNCS 4456. Berlin: Springer- Verlag, 2006:1375 - 1380.
  • 10张鹏,邓高明,邹程,赵强.差分功率分析攻击中的信号处理与分析[J].微电子学与计算机,2009,26(11):1-4. 被引量:8

二级参考文献27

  • 1谢满德,沈海斌,竺红卫.对智能卡进行微分功耗分析攻击的方法研究[J].微电子学,2004,34(6):609-613. 被引量:3
  • 2韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 3石伟,戴葵,童元满,龚锐.防DPA攻击的标准单元库的设计与实现[J].微电子学与计算机,2007,24(2):51-54. 被引量:4
  • 4Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [ J ]. Lecture Notes in Computer Science, 1999(1666) :388-397.
  • 5Eric Brier, Christophe Clavier, Francis Olivier. Corrdation power analysis with a leakage model [C]//Cryptographic Hardware and Embedded Systems - CHES 2004. Berlin: Springer, LNCS 3156, 2004:16-29.
  • 6Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 10 11]. http://www, impan, gov. pl/BC/Program/conferences/07Crypt - ahs/Aumonier% 20 - % 20SubmissionWorkshopSA. pdf.
  • 7Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks - revealing the secrets of smart cards [M]. USA:Springer, 2007:61-65.
  • 8Joan Daemen, Vincent Rijmen. The design of rijndael: AES- the advanced encryption standard [ M ]. Berlin: Springer- Verlag, 2002.
  • 9Schramm K,Paar C.IT Security Project:Implementation of the Advanced Encryption Standard(AES) on a Smart Card[C]//Proc.of ITCC'04.Piscataway,NJ,USA:[s.n.],2004.
  • 10Satoh A,Morioka S,Takano K,et al.A Compact Rijndael Hardware Architecture with S-box Optimization[C]//Proc.of the 7th International Conf.on the Theory and Application of Cryptology and Information Security.Gold Coast,Australia:[s.n.],2001.

共引文献14

同被引文献43

  • 1武传坤.布尔函数非线性度的谱分析[J].电子科学学刊,1996,18(5):487-495. 被引量:5
  • 2童元满,戴葵,陆洪毅,王志英.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16. 被引量:5
  • 3童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 4AGRAWAL D, RAO J R, ROHATGI P, et al. Templates as master keys[ J]. Cryptographie Hardware and Embedded System, 2005, 38 (12) : 53 - 56.
  • 5JOYE M, PAILLIER P, SCHOENMAKEBS B. On second-order differential power analysis [ C]// Proceedings of Cryptograph IC Hardware and Embedded Systems. Berlin: Springer-Verlag, 2005: 293 - 308.
  • 6HARDLE W. Smoothing Techniques: With implementation in S (Springer Series in Statistics) [ M]. Berlin: Springer-Verlag, 2008:296 - 306.
  • 7PARZEN E. On estimation of a probability density function and mode[ J]. The Annals of Mathematical Statistics, 1962, 33 (3) : 1065 - 1076.
  • 8KOCHER P,JAFFE J,JUN B.Differential power analysis.advances in cryptology[C]∥ CRYPTO'99 Proc 19th Ann Int Cryptology Conf.Santa Barbara,CA,USA.1999:388-397.
  • 9KOCHER P,JAFFE J,JUN B.Introduction to differential power analysis and related attacks[EB/OL].http:∥www.cryptography.com/dpa/technical,1998.
  • 10刘凯.分组密码芯片抗能量攻击关键技术研究[D].郑州:信息工程大学,2011.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部