期刊文献+

基于小波包的AES相关功耗分析攻击 被引量:1

Correlation Power Analysis Attack for AES Based on Wavelet Packet
下载PDF
导出
摘要 在相关功耗分析攻击中,功耗曲线噪声的存在会影响攻击结果的成功率。为此,运用小波包阈值进行去噪,提出一种功耗曲线预处理方法。利用小波包阈值法对功耗曲线进行去噪预处理,使用去噪后的功耗曲线执行相关功耗分析。实验结果表明,小波包阈值去噪能最大限度地去除功耗曲线中不相关的噪声,提高有用信号的信噪比,减少密钥分析所需数据和提高相关功耗分析的效率。 In Correlation Power Analysis(CPA) attack,the existence of power curves noise affects the success rate of attack results. For this reason, this paper proposes a new method of power curve preprocessing using wavelet packet threshold. The wavelet packet threshold method is first used to denoise the power curves and then perform the correlation power analysis. Experimental results show that wavelet packet threshold denoising can remove irrelevant noise in the power curves,improve the Signal to Noise Ratio(SNR) of the useful signal,reduce the data needed for the key analysis and improve the efficiency of the CPA.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第6期84-91,共8页 Computer Engineering
基金 北京市自然科学基金(4163076) 北京电子科技学院基金(328201505 328201508)
关键词 相关功耗分析 小波包变换 阈值 信噪比 去噪 Correlation Power Analysis(CPA) wavelet packet transformation threshold value Signal to Noise Ratio(SNR) denoising
  • 相关文献

参考文献3

二级参考文献42

  • 1MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 2Stefan Mangard, Elisabeth Oswald, Thomas Popp.能量分析攻击[M].冯登国,周永斌,刘继业,等译.北京:科学出版社,2010:100-109.
  • 3Lemke K,Paar C,Wolf M.Embedded security in cars[M].New York:Springer,2006.
  • 4Messerges T S.Securing the AES finalists against power analysis attacks[C].Fast Software Encryption.Springer Berlin Heidelberg,2001:150-164.
  • 5Kocher P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C].Advances in Cryptology-CRYPTO' 96.Springer Berlin Heidelberg,1996:104-113.
  • 6Gebotys C H,Ho S,Tiu C C.EM Analysis of Rijndael and ECC on a Wireless Java-based PDA[M].New York:Springer,2005:250-264.
  • 7Mayer-Sommer R.Smartly analyzing the simplicity and the power of simple power analysis on smartcards[C].Cryptographic Hardware and Embedded Systems-CHES 2000.Springer Berlin Heidelberg,2000:78-92.
  • 8Novak R.SPA-based adaptive chosen-ciphertext attack on RSA implementation[C].Public Key Cryptography.Springer Berlin Heidelberg,2002:252-262.
  • 9Koeher P,Jaffe J,Jun B.Differential power analysis[C].Advances in Cryptology-CRYPTO' 99.Springer Berlin Heidelberg,1999:388-397.
  • 10Pan W,Marnane W P.A correlation power analysis attack against tate pairing on FPGA[M].New York:Springer,2011:340-349.

共引文献10

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部