期刊文献+

一种AES算法的快速模板攻击方法 被引量:8

Fast template DPA attack against AES algorithm
下载PDF
导出
摘要 传统的模板攻击方法在模板构建阶段通常需要进行大量的计算,在计算协方差矩阵时甚至会遇到一些无法得出结果的情况。通过对模板攻击技术的深入研究,简化了模板结构,改进了模板构建方法,提出了一种新型模板攻击策略,成功解决了这些问题;同时,还独立完成了侧信道数据采集平台的开发,并编写了PC端的侧信道攻击软件。针对在Mage16单片机开发板上实现的AES加密算法,进行了基于模板的差分功耗分析(differential power analysis,DPA)攻击。实验结果表明,该方法能有效地避免传统的模板攻击可能发生的数值计算问题,相比于普通的DPA攻击,该方法所需要的能量迹数量大幅减少,有力地证明了该方法的有效性和实用性。 In the template building stage of the traditional template attack method, a large number of calculations are usually needed to calculate the covariance matrix, sometimes the result is even impossible to get. Through the in-depth study of the template attack technology, this paper proposed a new type of attack strategy. With the improvement of the template building, this method greatly simplified the template structure, and successfully solved these problems above. At the same time, it also independently completed the development of the side channel data acquisition platform, and wrote the side channel attack soft- ware used on PC. For AES encryption algorithm in Mage16 microcontroller development board, it performed a DPA attack based on template. The experimental results show that, this method can effectively avoid the numerical calculation problems that the traditional template attack may occur in the process, and compare to the ordinary DPA attacks, it dramatically reduces the number of the energy traces needed, which effectively proves the validity and practicability of the method.
出处 《计算机应用研究》 CSCD 北大核心 2017年第6期1801-1804,共4页 Application Research of Computers
基金 北京市自然科学基金资助项目(4163076 4152048) 北京电子科技学院基金资助项目(328201505 328201508)
关键词 模板攻击 差分能量分析 AES算法 简化的模板 template attack differentinal power analysis (DPA) AES algorithm simplified template
  • 相关文献

参考文献2

二级参考文献28

  • 1罗鹏,冯登国,周永彬.功耗分析攻击中的功耗与数据相关性模型[J].通信学报,2012,33(S1):276-281. 被引量:7
  • 2杨军,余江,赵征鹏.基于FPGA密码技术的设计与应用[M].北京:电子工业出版社,2012 :106 -143.
  • 3National Institute of Standards and Technology.Advanced encryption standard (AES)[S/OL].[2013-06-20].http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
  • 4Zhou Yongbin,Feng Dengguo.Side-channel attacks:ten years after its publication and the impacts on cryptographic module security testing,2005/388[R].[S.l.] :Cryptology ePrint Archive,2005.
  • 5Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis[J].Journal of Cryptographic Engineering,2011,1(1):5-27.
  • 6Yoshikawa M,Sugiyama M.Multi-rounds masking method against DPA attacks[C] //Proc ofIEEE International Conference on Information Reuse and Integration.2011:100-103.
  • 7Yoshikawa M,Kojima Y.Efficient random number for the masking method against DPA attacks[C] //Proc of the 21st International Conference on Systems Engineering.2011:321-324.
  • 8Burns F,Bystrov A,Koelmans A,et al.Design and security evaluation of balanced 1-of-n circuits[J].IET Computers & Digital Techniques,2012,6(2):125-135.
  • 9Renauld M,Kamel D,Standaert F,et al.Information theoretic and security analysis of a 65-nanometer DDSLL AES S-box[C] //Cryptographic Hardware and Embedded Systems.2011:223-239.
  • 10Mangard S,Oswald E,Standaert F X.One for all-all for one:unifying standard differential power analysis attacks[J].IET Information Security,2011,5(2):100-110.

共引文献2

同被引文献32

引证文献8

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部