期刊文献+

基于模板的光辐射分析攻击 被引量:3

Template based photonic emission attacks
下载PDF
导出
摘要 根据密码芯片光辐射的数据相关性,利用时间相关单光子计数技术搭建了光辐射分析实验平台,对基于模板的光辐射分析攻击进行分析。通过对光辐射迹进行模板刻画、构建策略和匹配方法的讨论,结合密码芯片光辐射的数据相关性,采用基于光辐射汉明重量模型的方法进行模板构建,并选取高级加密标准(AES)加密算法第一轮加密的S盒输出作为攻击点,结果表明基于该方法的模板匹配相较汉明距离等其他模型具有更加精确的匹配度。成功实施基于模板的光辐射分析攻击。 In view of the data correlation of cryptographic chip’s optical radiation, using time-correlated single photon coun-ting techniques to build photonic emission analysis attacks experimental platform, this paper analyzed template based photonic emission attacks.It discussed the trace of photonic emission to portray template, built strategies and matching methods.Then, it portrayed template by using Hamming weight model and chose the S-box of the first round of advanced encryption standard (AES) encryption algorithm as the point of attack to implement successfully the template based photonic emission attacks.The result shows the template based photonic emission attacks is more efficient than other models.
出处 《计算机应用研究》 CSCD 北大核心 2017年第7期2151-2154,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(51377170) 河北省自然科学基金资助项目(F2012506008)
关键词 高级加密标准 光辐射分析攻击 模板攻击 时间相关单光子计数技术 advanced encryption standard photonic emission analysis attacks template attacks time-correlated single photon counting techniques
  • 相关文献

参考文献1

二级参考文献23

  • 1孙志斌,马海强,雷鸣,杨捍东,吴令安,翟光杰,冯稷.近红外单光子探测器[J].物理学报,2007,56(10):5790-5795. 被引量:15
  • 2张蜡宝, 康琳, 陈健, 赵清源, 郏涛, 许伟伟, 曹春海, 金飚兵, 吴培亨 2011 物理学报 60 038501.
  • 3[J].Boer B, Lemke K, Wicke G. 2002 .Cryptographic Hardware and Embedded Systems-CHES. 2002 .4th International Workshop Redwood Shores, CA, USA, August: 13-15,. 2002 .p228.
  • 4Agrawal D, Archambeault B, Rao J R, Rohatgi P. 2002 .Cryptographic Hardware and Embedded Systems-CHES. 2002 .4th International Workshop Redwood Shores, CA, USA, August: 13-15,. 2002 .p29.
  • 5Skorobogatov S, Anderson R. 2002 .Cryptographic Hardware and Embedded Systems-CHES. 2002 .4th International Workshop Redwood Shores, CA, USA, August: 13-15,. 2002 .p2.
  • 6Skorobogatov S. 2005 .Ph.D. Dissertation (London: University of Cambridge).
  • 7Ferrigno J, Hlavá M. 2008 .IET Infor. Secur. 2 94.
  • 8Kramer J, Nedospasov D, Schlosser A, Seifert J. 2013 .Constructive Side-Channel Analysis and Secure Design (Berlin: Springer-Verlag) p1.
  • 9Wang Y J, Ding T, Ma H Q, Jiao R Z. 2014 .Chin. Phys. B: 23: 060308.
  • 10LIANG Y, ZENG H P. 2014 .Sci. China Phys. Mech. Astron. 57: 1218.

共引文献2

同被引文献15

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部