摘要
针对插入时间片造成功耗曲线不能对齐,最终造成CPA攻击失败的情况,提出了两种解决方法:POC和时-频转换。POC方法利用相位计算功耗曲线间的波峰位置,得到功耗曲线间的偏移量,根据偏移量将功耗曲线进行对齐。时-频转换方法将时域的实测功耗通过频谱变换,换转成频域的功耗。以SIC90C58AD微控制器为硬件仿真平台,SM4算法为研究对象,对加入了随机时间片的功耗曲线进行POC和时-频转换处理,并进行相关功耗分析攻击,结果显示:使用POC方法,197条功耗曲线可以成功获取SM4密码算法的第一轮轮密钥;使用时-频转换方法,439条功耗曲线可以获取密钥。证明POC和时-频转换方法可以对抗时间片。
Inserting random time slices in the power curve will cause the power curve unable to be aligned, which resul- ting in CPA attacking failure. In view of this case, two solutions are put forward : POC and time-frequency conversion. POC method uses the knowledge of phase to compute the position of power curves' wave peak, the offset between power curves is obtained. And the power curves are aligned according to the offset. In time-frequency conversion method, the measured pow- er consumption of time domain is changed to the power consumption of frequency domain by spectrum transform. Taking the SIC90C58AD micro controller as hardware simulation platform, SM4 algorithm as the research target, the power curves which have been inserted with random time slices are dealt by using POC and time-frequency conversion, and disposed with correla- tion power analysis attacking, the experimental results show: with using of POC method, 197 power traces can successfully acquire SM4's first round keys ; with using of time-frequency conversion method, 439 power traces can acquire the keys. It is proved that the POC and time-frequency conversion can successfully attack the time slices.
出处
《四川理工学院学报(自然科学版)》
CAS
2015年第2期14-17,共4页
Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词
相关功耗分析
时间片对抗
时-频变换
POC
correlation power analysis(CPA)
time slices countermeasure
time-frequency conversion
POC