期刊文献+

基于模板攻击的AES差分能量分析 被引量:1

The Differential Power Analysis Against AES based on Template Attack
下载PDF
导出
摘要 将AES算法中S-Box的运算输出作为差分能量分析的中间值,设计基于特征点分布和汉明重量模型的模板构建策略,并以贝叶斯定理优化攻击。该方法可降低计算复杂度和模板数量,实验结果验证了其有效性。 This paperfirstly utilizes the output of S-Box operation in the AES algorithmas theintermediate valueof dif erential power analysis,designsthe construction strategy of template based on the characteristicdistributionand Hamming-Weight Model,and then conducts the at ack optimizedby Bayes' theorem. The method can greatly reduce the computational complexity and the number of template, and the ef ectivenessof which is demonstrated by the experimental result.
出处 《信息安全与技术》 2014年第9期51-54,共4页
关键词 模板攻击 差分能量分析 高级加密标准 汉明重量模型 template at ack dif erential power analysis advanced encryption standard hamming-weight model
  • 相关文献

参考文献2

二级参考文献14

  • 1CHARI S, RAO J K, ROHATGI P. Template attacks[C]//Proceedings of CHES 2002. Berlin: Springe:13-28.
  • 2AGRAWAL D, RAO J R,ROHATGI P, et al. Tem-plates as master keys[C]// Proceedings of the Work-shop on Cryptographic Hardware and Embedded Sys-tems (CHES'05). Edinburgh, 2005 : 15-29.
  • 3ARCHAMBEAU C, PEETERS E, STANDAERT FX,et al. Template attacks in principal subspaces[C]// Proceedings of the Workshop on CryptographicHardware and Embedded Systems (CHES'06). Yoko-hama ,2006 .1-14.
  • 4GIERUCHS B,LEMKE-RUST K, PAAR C. Tem-plates vs. Stochastic methods[C]// Proceedings of theWorkshop on Cryptographic Hardware and EmbeddedSystems (CHESD6). Yokohama, 2006 : 15-29.
  • 5STANDAERT F X,ARCHAMBEAU C, Using sub-space-based template attacks to compare and combinepower and electromagnetic information leakages[C]//Proceedings of the Workshop on Cryptographic Hard-ware and Embedded Systems (CHES108 ). Washing-ton, 2008: 411-425.
  • 6LERMAN L, BONTEMPI G, MARKOWITCH O.Side channel attack: an approach based on machinelearning[C]// Proceedings of 2nd International Work-shop on Constructive Side-Channel Analysis and Secu-rity Design, 2011: 29-41.
  • 7International Electro Technical Commission. I EC61967 : Integrated Circuits-MeavSurement of Electro-magnetic Emanations. 150 kHz to 1 GHz [S/OL]2002. http://www. iec. ch/.
  • 8RECHBERGER C, OSWALD E. Practical templateattacks[C]// W1SA, Springer, 2004, 3325: 440-456.
  • 9HANLEY N, TUNSTALL M, MARNANE W P.Unknown plain-text template attacks [ C]// Work-shop on Information Security Applications,December2009:148-162.
  • 10邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16

共引文献9

同被引文献13

  • 1MANGARDS,OSWALDE,POPPT.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2009.
  • 2TANG M. Cluster based power analysis against the RSM scheme in different implementation. Crypto IC 2014[R]R. Beijing: Tsinghua University, 2014. 12- 26.
  • 3RECHBERGER C, OSWALD E. Practical template attacks[R]. WISA 2004.Lecture Notes in Computer Science3325. Berlin. Springer, 2004440-456.
  • 4GIERLICHS B, LEMKE-RUST K, PAAR C. Tem- plates vs. stochastic methods[R]. CHES 2006. Lec- ture Notes in Computer Science 4249. Berlin. Spring- er, 2006 : 15-29.
  • 5ARCHAMBEAU C,PEETERS E, STANDAERT F, et al. Template attacks in principal subspaces[R]. Ches 2006. Lecture Notes in Computer Science 4249. Berlin Springer 2006 : 1-4.
  • 6HASTIE T, TIBSHIRANI R, FRIEDMAN J, et al. The elements of statistical learning data mining, in ference and prediction [J]. The mathematical intelli gencer, 2005, 27(2):83-85.
  • 7HOMMA N, NAGASHIMA S, SUGA-WARA T. A high-resolution phase-based waveform matching and its application to side-channel attacks [J]. IEICE transactions on fundamentals, 2008, ME91-A (1) . 193-202.
  • 8拉奇迪,特卡.电磁场与传输线的相互作用:从经典理论到高频辐射效应[M].北京:清华大学出版社,2013.
  • 9李江源,王建国,杨建宇.一种新的基于ICA的SAR图像干扰分离方法[J].电波科学学报,2008,23(3):491-495. 被引量:1
  • 10邓高明,赵强,张鹏,陈开颜,刘晓芹.针对密码芯片的电磁频域模板分析攻击[J].计算机学报,2009,32(4):602-610. 被引量:16

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部