期刊文献+

针对RSM轻量防护方法的能量分析 被引量:1

Power Analysis against Lightweight Countermeasure RSM
原文传递
导出
摘要 以已有的轻量级RSM掩码方案为研究对象,利用掩码汉明重量的差异提出了一种新型攻击方法,并在此基础上,利用加密过程中间值的汉明重量差异进行能量分析,将该攻击方法扩展成为了掩码汉明重量无差异的对抗方法.实验结果表明,本文的攻击方法可还原单次加密的掩码值,成功率达到93.1%,经DPA Contest官网所提供数据验证,该攻击方法可成功还原掩码并最终完成密钥恢复. In this paper, we propose a new attack method based on the difference of the hamming weight in mask values to be against the lightweight masking scheme RSM. The new method processes the power analysis to restore the mask values and then breaks the keys of encryption algorithm. The proposed method also can be extended to break the masking scheme without difference in the hamming weight of mask values. The experimental result showed that our method could restore mask values in each encryption and the success rate reached 93.1 %. Using the public data- base of power traces provided by DPA Contest, the proposed method successfully recovered the mask values and final- ly extracted the key.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2016年第3期235-241,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61202386) 国家重点基础研究发展计划(973)项目(2014ZX01032401-001)
关键词 侧信道分析 能量分析 轻量级掩码对抗 RSM掩码方案 汉明重量模型 channel analysis power analysis lightweight masking technology RSM Hamming weight model
  • 相关文献

参考文献22

  • 1KOCHER P, JAFFE J, JUN B. Differential power analysis[DB/OL]. [2014-07-10]. http://link, springer. com/chapter/10. 1007 % 2F3- 540- 48405-1_25.
  • 2BRIER E, CLAVIER C, OLIVER F. Correlation power analysis with a leakage model[DB/OL]. [2014- 09-11 ]. http://link, springer, com/chapter/lO. 1007 % 2F978- 3- 540- 28632- 5_2.
  • 3GIERLICHS B, BATINA L, TUYLS P, et al. Mutual information analysis [DB/OL]. [ 2014-09-20 ]. http:// link. springer, com/chapter/10. 1007% 2F978-3-540- 85053-3_27.
  • 4CHARI S, JUTLA C S, RAO J R, et al. Towards sound approaches to counteract power analysis attacks [DB/OL] . [2014-09-21]. http://link, springer, corn~ chapter/lO. 1007 %2F3-540-48405-1_26.
  • 5GOUBIN L , PATARIN J. DES and differential pow- er analysis - The duplication method[DB/OLl. [2014- 09-21 ]. http://link, springer, com/chapter/lO. 1007 - 2F3- 540- 48059- 5_15.
  • 6THOMAS S. Messerges. Securing the AES finalists against power analysis attacks [DB/OL1. [2014-09- 22]. http://link, springer, com/chapter/10. 1007/3- 540-44706-7_11.
  • 7CORON J S, GOUBIN L. On Boolean and arithmetic masking against differential power analysis[DB/OL]. [2014-09-22 ]. http://link, springer, corn/chapter/ 10. 1007/3-540-44499-8_18.
  • 8GOUBIN L. A sound method for switching between Boolean and arithmetic masking [DB/OL1. [2014-09- 23]. http://link, springer, corn/chapter/lO. 1007/3- 540- 44709-1_2.
  • 9AKKAR M L, GIRAUD C. An implementation of DES and AES, secure against some attacks[DB/OL]. [2014-09-23 ]. http://link, springer, corn/chapter/ 10. 1007/3-540-44709-1 26.
  • 10GOLIC J A, TYMEN C. Multiplicative masking and power analysis of AES[DB/OL]. [2014-09-23]. http ://link, springer, com/chapter/10. 1007/3- 540- 36400-5_16.

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部