期刊文献+

基于Hamming weight和泄漏光子数的高级加密标准密码芯片光辐射分析攻击 被引量:1

Attack on the advanced encryption standard cipher chip based on the correspondence between Hamming weight and the number of emitted photons
下载PDF
导出
摘要 通过研究密码芯片运行时的光辐射迹及其数据依赖性,建立了操作数汉明重量与泄漏光子数的对应关系,提出了一种简单有效的针对高级加密标准(AES)加密算法的密码芯片光辐射分析方法.根据密码芯片运行时的光泄漏特性,利用时间相关单光子计数技术搭建了光辐射分析攻击实验平台,在AES加密算法执行第一次的轮密钥加操作后和字节替换操作后分别进行光泄露信号采集,对基于操作数Hamming weight和AES密码芯片泄漏光子数对应关系的密钥分析攻击方法的有效性进行了实验验证,通过选择几组明文成功地破解了AES加密算法的密钥.实验结果表明,当密码芯片的泄露光子数与操作数的汉明重量呈近似线性关系时,该种光辐射密钥分析攻击方法对AES密码芯片的安全性构成了严重的威胁. The security of information transmission is of paramount importance in all sectors of society,whether civilian or defence related.In ancient times the encryption of secret messages was mainly realized by physical or chemical means,but this was later supplemented by mathematical techniques.In parallel,the breaking of enemy codes has also been a subject of intense study.To date,the only known absolutely secure means of encryption is through quantum cryptography.However,this still has to be implemented by equipment that is vulnerable to various physical attacks,so it is important to study these methods of attack,both for legitimate users and for the surveillance of criminal activities.Today,nearly all transactions have to be realized through the computer and much effort has been devoted to cracking the software.However,little attention has been paid to the hardware,and it has only recently been realized that computer chips themselves can leak sensitive information,from which a code may even be deciphered.By studying the photonic emission and the data dependency of a cryptographic chip during operation,the correspondence between the Hamming weight of the operand and the number of photons emitted may be established,based on which a simple and effective method is proposed to crack the Advanced Encryption Standard(AES) cipher chip.An experimental platform has been set up for measuring and analyzing the leaked photonic emission using time-correlated single-photon counting.An AT89C52 microcontroller implementing the operation of the AES cipher algorithm is used as a cipher chip.The emitted photons are collected when the first Add Round Key and Sub Bytes of the AES encryption arithmetic are executed,and their respective numbers are found to have a linear relationship with the operand Hamming weight.The sources of noise affecting the photon emission trace have been analyzed,so that the measurement error and uncertainty can be reduced effectively.With the help of our Hamming weight simulation model,by selecting one or several groups of plain text and comparing the corresponding relationship between the Hamming weight of the intermediate values and the number of photons emitted by the cipher chip,the key of the AES encryption algorithm has been successfully recovered and cracked.This confirms the effectiveness of this method of attack,which can therefore pose a severe threat to the security of the AES cipher chip.For the next step in the future,our method will be optimized to narrow the search range,and also combined with other photonic emission analysis attacks(such as simple photonic emission analysis and differential photonic emission analysis) to improve the efficiency.A comparison and evaluation of the various methods will be made.At the same time,our current experimental configuration will be improved to obtain a better collection efficiency and signal-to-noise ratio.
出处 《物理学报》 SCIE EI CAS CSCD 北大核心 2016年第11期300-308,共9页 Acta Physica Sinica
基金 国家自然科学基金(批准号:51377170 11304007) 河北省自然科学基金(批准号:F2012506008)资助的课题~~
关键词 高级加密标准 光辐射分析攻击 密码芯片 汉明重量 advanced encryption standard photonic emission analysis attack cryptographic chip Hamming weight
  • 相关文献

参考文献29

  • 1Kramer J, Kasper M, Seifert J P 2014 19th Asia and South Pacific Design Automation Conference Singapore, Republic of Singapore, January 20-23, 2014 p780.
  • 2Kramer J, Nedospasov D, Schlosser A, Seifert J P 2013 Constructive Side-Channel Analysis and Secure Design (Berlin: Springer-Verlag) p1.
  • 3Schlosser A, Nedospasov D, Kramer J, Orlic S, Seifert J P 2013 J. Cryptogr. Eng. 3 3.
  • 4Wang H S 2015 Ph. D. Dissertation (Shijiazhuang: Ordnance Engineering Collage) (in Chinese).
  • 5王红胜 2015 博士学位论文 (石家庄: 军械工程学院).
  • 6Kocher P 1996 Annual International Cryptology Conference California, August 18-22, 1996 p104.
  • 7Kocher P, Jaffe J, Jun B 1999 Annual International Cryptology Conference California, USA, August 15-19, 1999 p388.
  • 8Hnath W 2010 Ph. D. Dissertation(Massachusetts: Worcester Polytechnic Institute) (in USA).
  • 9Mulder E D 2010 Ph. D. Dissertation(Leuven: Katholieke Universiteit) (in The Kingdom of Belgium).
  • 10Biham E, Shamir A 1997 Annual International Cryptology Conference Santa Barbara, California, USA, August 17-21 1997 p513.

二级参考文献26

  • 1冯金垣,陈红娟,李丽秀,龚雯.单光子探测器雪崩光电二极管的低温控制系统及其温度特性[J].光学技术,2006,32(2):237-239. 被引量:7
  • 2Li L Q,Davis L M 1993 Rev.Sci.Instrum.64 1524
  • 3Levine B F,Bethea C G,Campbell J C 1985 Appl.Phys.Lett.46 333
  • 4Sun X L,Krainak M A,Abshire J B,Spinhirne J D,Trottier C,Davies M,Dautet H,Allan G R,Lukemire A T,Vandiver J C 2004 J.Mod.Opt.51 1333
  • 5Hu J T,Li L S,Yang W D,Manna L,Wang L W,Alivisatos A P 2001 Science 292 2060
  • 6Levine B F,Bethea C G,Campbell J 1985 Electron.Lett.21 194
  • 7Risk W P,Bethune D S 2002 Opt.Photon.News 13 26
  • 8Stellari F,Zappa F,Cova S,Porta C,Tsang J C 2001 IEEE Trans.Electron Devices 48 2830
  • 9Comelli D,D'Andrea C,Valentini G,Cubeddu R,Casiraghi R,Cantarelli D 2005 Optics Express 13 10075
  • 10Gallivanoni A,Rech I,Resnati D,Ghioni M,Cova S 2006 Optics Express 14 5021

共引文献14

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部