期刊文献+

运用t检验评估3DES算法的侧信道信息泄露 被引量:5

Evaluating side-channel information leakage in 3DES using the t-test
原文传递
导出
摘要 t检验是统计学中用来检验2个未知方差正态总体均值关系的假设检验方法。当总体的方差不相等,且样本量也不相等时,Welch t检验是一种比Students t检验更可靠的方法。该文将借鉴采用t检验对AES的实现进行侧信道信息泄露评估的方法,用Welch t检验来对3DES算法运行过程中的侧信道信息泄露进行评估,以衡量其是否可能受到一阶DPA攻击。该文构造了适合于3DES算法的Welch t检验方法,并对实现方法不同的3个运行3DES算法的设备进行了实验。实验结果表明该文的方法是有效的。 The t-test is a hypothesis test that deals with two Gaussian samples with unknown variances. When the two samples have unequal variances and unequal sample sizes, the Welch t-test is more reliable than the Student's t-test. This paper evaluates the 1st order side-channel information leakage of 3DES with an AES type t-test. Welch t-tests suitable for evaluating 3DES are given with tests on three different devices that show this method is effective.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第5期499-503,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61402536 61202493 61402252)
关键词 Welch T检验 3DES算法 侧信道 信息泄露评估 Welch t-test 3DES algorithm side-channel information leakage evaluation
  • 相关文献

参考文献14

  • 1Kocher P, Jaffe J, Jun B. Differential power analysis[C]//Proc CRYPTO'99. Berlin Heidelberg:Springer-Verlag, 1999:388-397.
  • 2Kocher P. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]//Proc CRYPTO'96. Berlin Heidelberg:Springer-Verlag, 1996:104-113.
  • 3CCMB-2012-09-001. Common Criteria for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/cc/.
  • 4CCMB-2012-09-001. Common methodology for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R4.pdf.
  • 5CCDB-2013-05-002. Supporting document-mandatory technical document:application of attack potential to smartcards[S/OL]. (2013-05). http://www.commoncriteriaportal.org/files/supdocs/CCDB-2013-05-002.pdf.
  • 6Mather L, Oswald E, Bandenburg J, et al. Does my device leak information? An a priori statistical power analysis of leakage detection tests[C]//Proc Advances in Cryptology-ASIACRYPT 2013. Berlin Heidelberg:Springer-Verlag, 2013:486-505.
  • 7Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side channel resistance validation[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
  • 8Jaffe J, Rohatgi P, Witteman M. Efficient side-channel testing for public key algorithms:RSA case study[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
  • 9Easter R, Quemard J-P, Sakurai G. ISO/IEC DIS 17825:Information technology-Security technique-Testing methods for the mitigation of non-invasive attack classes against cryptographic modules[Z]. Berlin:DIN, 2014-12-01.
  • 10Chothia T, Guha A. A statistical test for information leaks using continuous mutual information[C]//Proc Computer Security Foundations Symposium (CSF). Piscataway, NJ:IEEE Press, 2011:177-190.

同被引文献9

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部