期刊文献+

基于FPGA实现AES的侧信道碰撞攻击

Side-channel collision attack based on the FPGA implementation of AES
下载PDF
导出
摘要 为了解决攻击点在能量迹中具体位置的识别问题,在对侧信道碰撞攻击技术研究的基础上,提出了通过计算能量迹中每个采样点的方差来识别攻击点的方差检查技术。并利用基于相关系数的碰撞检测方法,对一种AES的FPGA实现实施了攻击。实验结果表明,方差检查技术可以有效地识别攻击点在能量迹中的具体位置。 To solve the problem on the identification of location of the attack point in the energy traces,this paper puts forward the variance inspection technology,which computes variance of every sampling points in energy traces to identify the attack point,based on the research of side-channel collision attack.What's more,this paper implements an attack to the AES FPGA implemented by the use of correlation-based collision detection method.The result shows that the variance detection technology can effectively identify the location of the attack point in the energy traces.
出处 《电子技术应用》 北大核心 2014年第10期66-68,71,共4页 Application of Electronic Technique
关键词 侧信道碰撞攻击 AES 方差检查 相关系数 碰撞检测 side-channel collision attack AES variance inspection correlation collision detection
  • 相关文献

参考文献7

  • 1SCHRAMM K,WOLLINGER T,PAAR C.A new class of collision attacks and its application to DES[C].Johansson,T.(ed.)FSE 2003,LNCS,Springer,Heidelberg,2003:206-222.
  • 2SCHRAMM K,LEANDER G,FELKE P,et al.A collisionattack on AES:combining side channel and differentialattack[C].Joye,M.,Quisquater,J.-J.(eds.) CHES 2004,LNCS,Springer,Heidelberg,2004:163-175.
  • 3BOGDANOV A.Improved side-channel collision attacks on AES[C].Selected Areas in Cryptography-SAC 2007,2007:84-95.
  • 4MORADI A,MISCHKE O,EISENBARTH T.Correlationenhanced power analysis collision attack[C].CHES,2010:125-139.
  • 5CANRIGHT D.A very compact S-Box for AES[C].CHES 2005,volume 3659 of LNCS,Springer,2005:441-455.
  • 6SATOH A,MORIOKA S,TAKANO K,et al.A compact rijndael hardware architecture with S-Box optimization[C].Advances in Cryptology-ASIACRYPT 2001,volume 2248of LNCS,Springer,2001:239-254.
  • 7段二朋,严迎建,李佩之.针对AES密码算法FPGA实现的CEMA攻击[J].计算机工程与设计,2012,33(8):2926-2930. 被引量:7

二级参考文献18

  • 1孟昭敦.电磁场导论[M].北京:中国电力出版社,2007.
  • 2Paul C Kocher. Timing attacks on implementations of Diffie-Hellman RSA DSS and other systems [G]. LNCS 1109: Proceedings of Crypto of, pages. Springer-Verlag, 1996: 104-113.
  • 3Kocher P, Jaffe J, Jun B. Differential power analysis [G]. LNCS 1666: Proceeding of CRYPTO, Santa Bartara, California, USA, Springer, 1999:388-397.
  • 4Jean-Jacques, Quisquater and David Samyde:Electromagnetic analysis (EMA): Measures and counter-measures for smard cards[G]. LNCS 2140:Smart Card Programming and Security. Cannes, France, Springer-Verlag; 2001:200-210.
  • 5Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis: Concrete results [G]. LNCS 2162: Cryptographic Hardware Embedded System, 2001:255-265.
  • 6Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model [C]. LNCS 3156: Cryptographic Hardware Embedded System. Berlin/Heidelberg: Springer, 2004:16-29.
  • 7Tunstall M, Hanley N, McEvoy R P, et al. Correlation power analysis of large word sizes [C]. Proc of ISSC, 2007: 145-150.
  • 8Messerges T, Dabbish E, Sloan R. Investigation of power analysis attacks on smartcards [C]. Proceedings of the USE NIX Workshop on Smartcard Technology. Chicago, Illinois, USA:USENIX Association, 1999: 151-161.
  • 9Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109.
  • 10Thanh Ha I.e, Jessy Clediere, Cecile Canovas, et al. A proposition for correlation power analysis enhancement [ G]. LNCS 4249 : Louis Goubin and Mitsuru Matsui editors CHES, 2006:174- 186.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部