期刊文献+

基于互信息博弈的侧信道攻击安全风险评估 被引量:2

Side Channel Risk Evaluation Based on Mutual Information Game
下载PDF
导出
摘要 侧信道攻击的攻防过程可以视为互信息博弈过程,博弈的双方分别为密码设备设计者(防御方)和攻击者。防御方的博弈目标是通过制定相关的防御策略,减少由侧信道泄漏所引发的局部风险和全局风险;对攻击方而言,其博弈目标正好与之相反。从制定安全策略、降低安全风险的角度出发,将互信息博弈理论引入密码芯片设计者(防御方)和攻击者的决策过程,考察攻防策略的选择对安全风险的影响,并结合互信息的量化方法,给出了Nash均衡条件下攻防双方的优化策略选择方法及Nash均衡下攻防双方的互信息收益。 Attack process of side channel attacks can be regarded as mutual information gambling process.Both sides of the game were cryptographic equipment designers(defense party) and the attacker.The game goal of defenders is formulated by the defense strategy to reduce local and global risk which caused by the side channels leakage;to attack side,the game target and to the contrary.From make safety strategy,reduce safety risk angle,mutual information game theoryis introduced in the decision-making process of the cryptographic chips designers(defense party) and the attacker,to investigate the attack and design tactics choice to security risks,and combined with the quantitative methods of the mutual information,give the optimization tactics selection method of the both sides of attack and design on Nash equilibrium conditions,give the mutual information benefits of the both sides of attack and design on Nash equilibrium.
作者 姚剑波 张涛
出处 《计算机科学》 CSCD 北大核心 2012年第B06期69-71,共3页 Computer Science
基金 贵州省科学技术基金项目(黔科合J字2009(2275))资助
关键词 互信息博弈 侧信道攻击 安全风险 风险评估 Mutual information game; Side-channel attack; Risk; Risk evaluation
  • 相关文献

参考文献4

二级参考文献25

共引文献62

同被引文献17

  • 1童元满,戴葵,陆洪毅,王志英.基于细粒度任务调度的防功耗分析模幂方法[J].计算机工程,2006,32(24):15-16. 被引量:5
  • 2童元满,王志英,戴葵,石伟,陆洪毅.基于动态双轨逻辑的抗功耗攻击安全芯片半定制设计流程[J].小型微型计算机系统,2007,28(5):935-939. 被引量:7
  • 3AGRAWAL D, RAO J R, ROHATGI P, et al. Templates as master keys[ J]. Cryptographie Hardware and Embedded System, 2005, 38 (12) : 53 - 56.
  • 4JOYE M, PAILLIER P, SCHOENMAKEBS B. On second-order differential power analysis [ C]// Proceedings of Cryptograph IC Hardware and Embedded Systems. Berlin: Springer-Verlag, 2005: 293 - 308.
  • 5HARDLE W. Smoothing Techniques: With implementation in S (Springer Series in Statistics) [ M]. Berlin: Springer-Verlag, 2008:296 - 306.
  • 6PARZEN E. On estimation of a probability density function and mode[ J]. The Annals of Mathematical Statistics, 1962, 33 (3) : 1065 - 1076.
  • 7姚剑波.层次化的侧信道攻击风险量化评估模型[J].计算机工程与应用,2011,11(3):131-133.
  • 8JoyeM,Paillier P,Schoenmakers B.On second-order differential power analysis[C]//Proc of Cryptograph ic Hardware and Embedded Systems (CHES 2005),LNCS 3659.Springer-Verlag,2005:293-308.
  • 9Veyrat-Charvillon N,Standaert F-X.Mutual information analysis:how,when and why?[C]//The Proceedings of CHES 2009,Lausanne,Switzerland,September 2009.Lecture Notes in Computer Science,vol.5747,Springer,Berlin,2009:429-443.
  • 10Standaert F-X,Veyrat-Charvillon N,Oswald E,et al.The world is not enough:another look on second-order DPA[C]//The Proceedings of Asiacrypt 2010,Singapore,December 2010.Lecture Notes in Computer Science,vol.6477.Springer,Berlin,2010:112-129.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部