期刊文献+

微控制器密码芯片秩相关电磁分析 被引量:1

Rank correlation electromagnetic analysis on microcontroller
下载PDF
导出
摘要 研制一种新的基于秩相关系数的电磁分析技术.利用Spearman秩相关系数,度量密码芯片的电磁辐射信号与内部处理数据之间的相关性.与基于Pearson线性相关系数的方法相比,该方法对测试数据的样本分布不作要求,对测量水平要求更低,具有更强的适应性.针对AT89C52微控制器实现的AES密码进行的攻击实验表明,当电磁探头距离微控制器10 cm时,基于Pearson相关度量的攻击失效,而基于秩相关度量的电磁分析技术仍能在42 500个样本下成功获取AES前8位密钥. A new electromagnetic analysis (EMA) technique based on rank correlation coefficient was proposed. The correlation between the electromagnetic signal and the data operated in the cipher chip was measured with Spearman's rank correlation coefficient. Compared to the method of Pearson linear correlation coefficient, the rank correlation method did not need particular distributed sample data and did not need high-resolution measuring tools. There for, it was more adaptable. Experiments were executed on the prototype of AES, which implemented in an AT89C52 microcontroller. The results show that Pearson's correlation based EMA failed when the electromagnetic probe positioned 10 cm away from the chip, while Spearman's rank correlation coefficient based EMA successfully retrieved the first 8-bit secret key of AES with 42 500 traces.
出处 《深圳大学学报(理工版)》 EI CAS 北大核心 2012年第3期230-235,共6页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(60940019 60571037)~~
关键词 数据安全与计算机安全 旁路攻击 电磁分析 秩相关性 微控制器 高级加密标准 data security and computer security side channel attacks electromagnetic analysis rank correlation microcontroller advanced encryption standard
  • 相关文献

参考文献8

  • 1Quisquater J J, Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards [ C ]// Isabelle Attali, Thomas Jensen. International Conference on Research in Smart Card, E-Smart. Canne ( France ) : Springer, 200 !, 2140 : 200-210.
  • 2Kocher P, Jaffe J, Jun B. Differential power analysis [ C ]// Wiener M. Advances in Cryptology, CRYPTO'99. Santa Barbara(USA) : Springer-Verlag, 1999, 1666 : 388- 397.
  • 3Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model [ C ]//Joye M, Quisquater J J. Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems. Cambridge ( USA ) : Springer, 2004, 3156: 16-29.
  • 4Chari S, Rao J R, Rohatgi P. Template attacks [ C 1// Kaliski B S. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Redwood Shores (USA): Springer-Verlag, 2003, 2523: 13- 28.
  • 5Agrawal D, Archambeault B, Rao J R, Rohatgi P. The EM side-channel (s): attacks and assessment methodologies [ C ]// Kaliski B S. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Redwood Shores ( USA ) : Springer-Verlag, 2003, 2523 : 29-45.
  • 6非参数统计[M].北星,译.北京:科学出版社,1986.SiegelS.
  • 7FIPS-197. Advanced Encryption Standard [ S].
  • 8张鹏,邓高明,陈开颜,赵强.针对AES密码芯片的远场相关性电磁分析攻击[J].华中科技大学学报(自然科学版),2009,37(8):31-34. 被引量:9

二级参考文献11

  • 1Quisquater J J, Samyde D. Electromagnetic analysis (EMA).. measures and counter-measures for smard cards[C]// Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, LNCS 2140. Berlin/Heidelberg: Springer, 2001: 200-210.
  • 2Agrawal D, Archambeault B, Rao J R, et al. The EM side-channel(s) : attacks and assessment methodologies[C] //Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523. Berlin/Heidelberg: Springer, 2003: 29-45.
  • 3Peeters E, Standaert F X, Quisquater J J. Power and electromagnetic analysis., improved model, consequences and comparisons [J]. The VLSI Journal.. Embedded Cryptographic Hardware, 2007, 40 (1) :52-60.
  • 4Mulder E D, Ors S B, Preneel B, et al. Differential power and electromagnetic attacks on a FPGA imple- mentation of elliptic curve cryptosystems[J]. Computers and Electrical Engineering, 2007, 33 (5-6) : 367-382.
  • 5Sauvage L, Guilley S, Mathieu Y. Electromagnetic radiations of FPGAs: high spatial resolution cartography and attack of a cryptographic module[J]. ACM Transactions on Reconfigurable Technology and Systems, 2009, 2(1): 1-24.
  • 6Kim Changkyun, Schlaffer M, Moon S. Differential side channel analysis attacks on FPGA implementations of ARIA[J]. ETRI Journal: Information, Telecommunications & Electronics, 2008, 30 (2) : 315- 325.
  • 7Kocher P, Jaffe J, Jun B. Differential power analysis [C] //Advances in Cryptology-CRYPTO' 99, LNCS 1666. Berlin/Heidelberg: Springer, 1999: 388-397.
  • 8Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model[C]//Proceedings of Cryptographic Hardware and Embedded Systems CHES 2004, LNCS 3156. Berlin/Heidelberg Springer, 2004.. 16-29.
  • 9National Institute of Standards and Technology. FIPS-197:advanced encryption standard [ S ]. Gaithersburg:National Institute of Standards and Technology, 2001.
  • 10Mangard S, Oswald E, Popp T. Power analysis aat tacks--revealing the secrets of smart cards[M] New York : Springer , 2007.

共引文献8

同被引文献17

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部