摘要
传统的模板攻击方法在模板构建阶段通常需要进行大量的计算,在计算协方差矩阵时甚至会遇到一些无法得出结果的情况。通过对模板攻击技术的深入研究,简化了模板结构,改进了模板构建方法,提出了一种新型模板攻击策略,成功解决了这些问题;同时,还独立完成了侧信道数据采集平台的开发,并编写了PC端的侧信道攻击软件。针对在Mage16单片机开发板上实现的AES加密算法,进行了基于模板的差分功耗分析(differential power analysis,DPA)攻击。实验结果表明,该方法能有效地避免传统的模板攻击可能发生的数值计算问题,相比于普通的DPA攻击,该方法所需要的能量迹数量大幅减少,有力地证明了该方法的有效性和实用性。
In the template building stage of the traditional template attack method, a large number of calculations are usually needed to calculate the covariance matrix, sometimes the result is even impossible to get. Through the in-depth study of the template attack technology, this paper proposed a new type of attack strategy. With the improvement of the template building, this method greatly simplified the template structure, and successfully solved these problems above. At the same time, it also independently completed the development of the side channel data acquisition platform, and wrote the side channel attack soft- ware used on PC. For AES encryption algorithm in Mage16 microcontroller development board, it performed a DPA attack based on template. The experimental results show that, this method can effectively avoid the numerical calculation problems that the traditional template attack may occur in the process, and compare to the ordinary DPA attacks, it dramatically reduces the number of the energy traces needed, which effectively proves the validity and practicability of the method.
出处
《计算机应用研究》
CSCD
北大核心
2017年第6期1801-1804,共4页
Application Research of Computers
基金
北京市自然科学基金资助项目(4163076
4152048)
北京电子科技学院基金资助项目(328201505
328201508)
关键词
模板攻击
差分能量分析
AES算法
简化的模板
template attack
differentinal power analysis (DPA)
AES algorithm
simplified template