期刊文献+

针对分组密码S盒的能量分析攻击效率研究 被引量:4

The efficiency of power analysis attack based on S-boxes of block ciphers
原文传递
导出
摘要 为弥补数学分析方法对S盒安全性评估的不足,使用相关能量分析和模板攻击,对DES(data encryption standard)、AES(advanced encryption standard)和Serpent密码算法中不同的S盒结构进行安全评估,使用MATLAB进行仿真实验。对于相关能量分析,Serpent算法的单个S盒抗攻击性能最强,至少需要206条能量迹,AES和DES算法分别需要112条和160条能量迹。对于模板攻击,Serpent算法的S盒也能最有效抵抗模板攻击,而AES次之,DES抗攻击性最弱。实验结果表明,在一轮算法操作比特总数相同的情况下,低位宽S盒抗能量分析攻击的效果优于高位宽S盒。 In order to make up the safety assessment of S-boxes,which was traditionally tested by mathematical meth-ods,correlation power analysis and template attack were used on different S-boxes of DES,AES and Serpent. The sim-ulations were put forth by MATLAB to obtain the success rates. The S-box of Serpent was the strongest against both the correlation power analysis and template attack. In correlation power analysis,Serpent needed 206 power traces,while AES and DES needed only 112 and 160 respectively. In addition,AES was stronger than DES against template attack. The results showed that the low-wide S-box was stronger than the high-wide S-box with the same total number of bits in one round.
作者 王丹辉 王安
出处 《山东大学学报(工学版)》 CAS 北大核心 2014年第2期6-11,共6页 Journal of Shandong University(Engineering Science)
基金 国家重点基础研究发展规划(973计划)资助项目(2013CB834205) 国家自然科学基金重点资助项目(61133013) 信息保障技术重点实验室开放基金资助项目(KJ-13-101)
关键词 S盒 能量分析攻击 分组密码 相关能量分析 模板攻击 能量迹 S-box power analysis attack block cipher correlation power analysis template attack power trace
  • 相关文献

参考文献27

  • 1NYBERG K, KNUDSEN L R. Provable security against a differential attack [ C ]//Proceedings of the 12t" AnnualInternational Cryptology Conference. Santa Barbara, Cali- fornia, USA: Springer-Verlag, 1993:566-574.
  • 2KOCHER P. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems [ C ]//Proceed- ings of the 16h Annual International Cryptology Confer- ence. Santa Barbara, California, USA: Springer-Verlag, 1996 : 104-113.
  • 3KRIEG A, BACHMANN B, GRINSCHGL J. Accelera- ting early design phase differential power analysis using power emulation techniques [ C ]//Proceedings of the IEEE International Symposium on Hardware-Oriented Se- curity and Trust. San Diego CA:IEEE Computer Society, 2011:81-86.
  • 4FERGUSON N, SCHNEIER B, KOHNO T. Cryptogra- phy engineering:design principles and practical applica- tions [ M ]. USA: Wiley, 2010:125-128.
  • 5ORS S B, GURKAYNAK F, OSWALD E. Power-analy- sis attack on an ASIC AES implementation [ C ]//Proceed- ings of the Information Technology:Coding and Compu- ting. Washington, DC, USA: 1EEE Computer Society, 2004:546-552.
  • 6BILGIN B, NIKOVA S, NIKOV V, et al. Threshold im- plementations of all 33 and 44 S-boxes[ C ]//Proceedings of the 14th International Workshop. Leuven, Belgium: Springer-Verlag, 2012:76-91.
  • 7CANRIGHT D, BATINA L. A very compact "perfectly masked" S-Box for AES [ C ]//Proceedings of the 6 In- ternational Conference, ACNS 2008. New York, NY, USA: Springer-Verlag, 2008:446-459.
  • 8CARLET C, GOUBIN L, PROUFF E, et al. Higher-or- der masking schemes for S-boxes [ C] //Proceedings of the 19th International Workshop, FSE 2012. Washington, DC, USA: Springer-Verlag, 2012 : 366-384.
  • 9GENELLE L, PROUFF E, QUISQUATER M. Thwarting higher-order side channel analysis with additive and multi- plicative Maskings [ C]//Proceedings of the 13th Interna- tional Workshop. Nara, Japan: Springer-Verlag, 2011 : 240-255.
  • 10ROY A, VIVEK S. Analysis and improvement of the generic higher-order masking scheme of FSE 2012 [ C ]//Proceedings of the 15th International Workshop. Santa Barbara, CA, USA: Springer-Verlag, 2013:417- 434.

二级参考文献36

  • 1谢满德,沈海斌,竺红卫.对智能卡进行微分功耗分析攻击的方法研究[J].微电子学,2004,34(6):609-613. 被引量:3
  • 2武传坤.布尔函数非线性度的谱分析[J].电子科学学刊,1996,18(5):487-495. 被引量:5
  • 3韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 4石伟,戴葵,童元满,龚锐.防DPA攻击的标准单元库的设计与实现[J].微电子学与计算机,2007,24(2):51-54. 被引量:4
  • 5Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential power analysis [ J ]. Lecture Notes in Computer Science, 1999(1666) :388-397.
  • 6Eric Brier, Christophe Clavier, Francis Olivier. Corrdation power analysis with a leakage model [C]//Cryptographic Hardware and Embedded Systems - CHES 2004. Berlin: Springer, LNCS 3156, 2004:16-29.
  • 7Sebastien Aumonier. Generalized correlation power analysis [EB/OL]. [2007 - 10 11]. http://www, impan, gov. pl/BC/Program/conferences/07Crypt - ahs/Aumonier% 20 - % 20SubmissionWorkshopSA. pdf.
  • 8Stefan Mangard, Elisabeth Oswald, Thomas Popp. Power analysis aattacks - revealing the secrets of smart cards [M]. USA:Springer, 2007:61-65.
  • 9Joan Daemen, Vincent Rijmen. The design of rijndael: AES- the advanced encryption standard [ M ]. Berlin: Springer- Verlag, 2002.
  • 10Schramm K,Paar C.IT Security Project:Implementation of the Advanced Encryption Standard(AES) on a Smart Card[C]//Proc.of ITCC'04.Piscataway,NJ,USA:[s.n.],2004.

共引文献27

同被引文献31

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部