摘要
针对Komano等(KOMANO Y,SHIMIZU H,KAWAMURA S.BS-CPA:built-in determined sub-key correlation power analysis.IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2010,E93-A(9):1632-1638.)对dpacontest.org平台提供的数据进行研究后提出的内置确定性子密钥相关系数功耗分析(BS-CPA)方法进行分析,并从破解所需功耗数据和成功率方面将BS-CPA与差分功耗分析(DPA)、相关系数功耗分析(CPA)进行比较分析,发现BS-CPA虽然理论上方法可行,但远未达到其声称的效果,进而从密码设备加密过程中寄存器状态的变化与功耗值的关系来选取中间变量,通过去除噪声和错误峰值,找到与密钥最相关数据点来缩小攻击范围。对于相同数量功耗数据,部分点攻击与全部点攻击相比,完全破解64位密钥的成功率最大可以提高60%。实验结果表明改进后的模型攻击效率得到提升,达到同样成功率需要功耗数据少,攻击结果稳定。
To study the Built-in determined Sub-key Correlation Power Analysis (BS-CPA) proposed by Yuiehi Komano et al. ( KOMANO Y, SHIMIZU H, KAWAMURA S. BS-CPA: built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010, E93-A (9): 1632 - 1638. ) based on the data set of dpacontest, org, this paper compared the efficiency of Differential Power Analysis ( DPA), Correlation Power Analysis (CPA) and BS-CPA from the number of power consumption trace and success rate, the result shows that although BS-CPA works out nicely in theory, it is far from the reaching of the efficiency claimed by the authors, and then the intermediate was chosen by the relationship between the statement of executed cryptographic device' s register and power consumption. Attack surface was narrowed by the reduction of noise and ghost peak, the most relative point was filtered out. Compared with the whole point attack, the biggest success rate of partial point attack can be increased by 60% to crack the 64 bit keys for the same number traces. The experiment results prove that the improved model is able to increase the efficiency and decrease the needed power consumption trace for the same success rate, and the result is stable.
出处
《计算机应用》
CSCD
北大核心
2014年第5期1283-1287,1330,共6页
journal of Computer Applications
基金
国家自然科学基金资助项目(61103221)
关键词
差分功耗分析竞赛
内置确定性子密钥相关系数功耗分析
攻击模型
智能卡安全
Differential Power Analysis (DPA) contest
Buih-in determined Sub-key Correlation Power Analysis BS- CPA)
attack model
smart card security