期刊文献+

两种抗时间片的攻击方法

Two Attack Methods Against the Time Slices
下载PDF
导出
摘要 针对插入时间片造成功耗曲线不能对齐,最终造成CPA攻击失败的情况,提出了两种解决方法:POC和时-频转换。POC方法利用相位计算功耗曲线间的波峰位置,得到功耗曲线间的偏移量,根据偏移量将功耗曲线进行对齐。时-频转换方法将时域的实测功耗通过频谱变换,换转成频域的功耗。以SIC90C58AD微控制器为硬件仿真平台,SM4算法为研究对象,对加入了随机时间片的功耗曲线进行POC和时-频转换处理,并进行相关功耗分析攻击,结果显示:使用POC方法,197条功耗曲线可以成功获取SM4密码算法的第一轮轮密钥;使用时-频转换方法,439条功耗曲线可以获取密钥。证明POC和时-频转换方法可以对抗时间片。 Inserting random time slices in the power curve will cause the power curve unable to be aligned, which resul- ting in CPA attacking failure. In view of this case, two solutions are put forward : POC and time-frequency conversion. POC method uses the knowledge of phase to compute the position of power curves' wave peak, the offset between power curves is obtained. And the power curves are aligned according to the offset. In time-frequency conversion method, the measured pow- er consumption of time domain is changed to the power consumption of frequency domain by spectrum transform. Taking the SIC90C58AD micro controller as hardware simulation platform, SM4 algorithm as the research target, the power curves which have been inserted with random time slices are dealt by using POC and time-frequency conversion, and disposed with correla- tion power analysis attacking, the experimental results show: with using of POC method, 197 power traces can successfully acquire SM4's first round keys ; with using of time-frequency conversion method, 439 power traces can acquire the keys. It is proved that the POC and time-frequency conversion can successfully attack the time slices.
出处 《四川理工学院学报(自然科学版)》 CAS 2015年第2期14-17,共4页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 相关功耗分析 时间片对抗 时-频变换 POC correlation power analysis(CPA) time slices countermeasure time-frequency conversion POC
  • 相关文献

参考文献10

  • 1Brier E,Clavier C,Olivier F. Correlation power analysis with a leakage model[C]//Proceedings of the 6th Inter- national Workshop on Cryptographic Hardware and Em- bedded Systems ( CHES2004 ), Boston, USA, 2004:135- 152.
  • 2StefanM,ElisabethO,ThomasP.能量分析攻击[M].北京:科学出版社,2010.
  • 3罗晓飞,陈运,陈俊,杨斌.针对DES密码芯片的两种功耗攻击对比分析[J].成都信息工程学院学报,2012,27(6):536-540. 被引量:3
  • 4王创伟,张西红,李永浩,席伟.基于时间延迟和掩码的抗DPA方法研究[J].计算机测量与控制,2011,19(11):2801-2803. 被引量:1
  • 5Zhang L, Zhang D. Finger-knuckle-print verification based on bandlimited phase-only correlation[C]//Pro- ceedings of the 13th International Conference on Com- puter Analysis of Images and Patterns. Berlin:Springer Verlag, 2009:141-148.
  • 6Steven W S.The scientist and engineer's guide to digital signal processing[M]. California: California Technical Publishing,2003.
  • 7黄永远,陈运,陈俊,滕永平.运用频域辅助分析的AES算法相关功耗攻击[J].四川大学学报(自然科学版),2014,51(3):459-466. 被引量:7
  • 8黄永远,陈运,陈俊,滕永平,程思鹏.针对AES算法的时域和频域相关功耗攻击对比分析[J].成都信息工程学院学报,2013,28(5):460-465. 被引量:2
  • 9Chaff S,Rao J R,Rohatgi P.Template attaeks[C]//Cryp- tographic Hardware and Embedded Systems-CHES 2002. Springer Berlin Heidelberg,2003:13-28.
  • 10国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http://www.oscca.gov.cn/UpFil/200622026423297990.pdf.

二级参考文献46

  • 1陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 2韩军,曾晓洋,汤庭鳌.基于时间随机化的密码芯片防攻击方法[J].计算机工程,2007,33(2):6-8. 被引量:8
  • 3MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 4Tomas S. Messerges. Power Analysis Attacks and Countermeas- ures for Cryptographic Algorithms [D]. Doctor' s thesis, Gradu ate College of the University of Illinois at Chicago, 2000: 106 153.
  • 5Messerges TS. Securing the AES finalists against power analysis attacks [A]. International Workshop on Fast Software Encryption [C]. NewYork, NY, USA, 2000: 150-164.
  • 6胡敏予.社区护理学[M].长沙:湖南科学技术出版社,2003,3..
  • 7Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109.
  • 8Paul Kocher, Joshua Jaffe, Benjamin Jun. Differential Power Analysis[C]. Lecture Notes In Computer Sci- ence; Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, 1999,1666:388 - 397.
  • 9NBS, Data Encryption Standard. FIPS PUB46 [EB/OL]. National Bureau of Standards. WashingtonD, C., 1977.
  • 10Eric Brier,Christophe Clavier,Francis Olivier. Correlation Power Analysis with a Leakage Model[C]. CHES 2004, LNCS 3156,2004 : 16 - 29.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部