期刊文献+

Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis 被引量:3

Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis
原文传递
导出
摘要 The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces. The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第2期210-220,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the Major Program“Core of Electronic Devices High-End General Chips and Basis of Software Products”of the Ministry of Industry and Information Technology of China(No.2014ZX01032205) the Key Technologies Research and Development Program of the Twelfth Five-Year Plan of China(No.MMJJ201401009)
关键词 Triple Data Encryption Standard (3DES) CPU smart cards power analysis key recovery side-channeanalysis Triple Data Encryption Standard (3DES) CPU smart cards power analysis key recovery side-channeanalysis
  • 相关文献

参考文献12

  • 1P.Kocher,J.Jaffe,and B.Jun,Differential power analysis,in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO),Santa Barbara,CA,USA,1999,pp.388–397.
  • 2S.Mangard,E.Oswald,and T.Popp,Power Analysis Attacks:Revealing the Secrets of Smart Cards.Boston,MA,USA:Springer,2007.
  • 3A.Moradi,M.Kasper,and C.Paar,Black-box side-channel attacks highlight the importance of countermeasures—An analysis of the Xilinx Virtex-4and Virtex-5 bitstream encryption mechanism,Lecture Notes in Computer Science,vol.7178,pp.1–18,2012.
  • 4T.Eisenbarth,T.Kasper,A.Moradi,C.Paar,M.Salmasizadeh,and M.M.Shalmani,On the power of power analysis in the real world:A complete break of the KEELOQ code hopping scheme,in Proceedings of the 28th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO),Santa Barbara,CA,USA,2008,pp.203–220.
  • 5D.Oswald and C.Paar,Breaking Mifare DESFire MF31CD40:Power analysis and templates in the real world,Lecture Notes in Computer Science,vol.6917,pp.207–222,2011.
  • 6T.H.Le,J.Clediere,C.Serviere,and J.L.Lacoume,Noise reduction in side channel attack using fourth-order cumulant,IEEE Transactions on Information Forensics&Security(TIFS),vol.2,no.4,pp.710–720,2007.
  • 7C.Clavier,J.S.Coron,and N.Dabbous,Differential power analysis in the presence of hardware countermeasures,Lecture Notes in Computer Science,vol.1965,pp.252–263,2000.
  • 8X.Charvet and H.Pelletier,Improving the DPA attack using wavelet transform,in NIST Physical Security Testing Workshop,Honolulu,HI,USA,2005.
  • 9J.J.Woudenberg,M.Witteman,and B.Bakker,Improving differential power analysis by elastic alignment,Lecture Notes in Computer Science,vol.6558,pp.104–119,2011.
  • 10T.Plos,M.Hutter,and M.Feldhofer,Evaluation of side-channel preprocessing techniques on cryptographicenabled HF and UHF RFID tag prototypes,in Workshop on RFID Security,Budapest,Hungary,2008,pp.114–127.

同被引文献5

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部