期刊文献+

一种基于奇异值分解的功耗轨迹筛选方法 被引量:1

A Method Based on Singular Value Decomposition for Enhancement of Differential Power Analysis
下载PDF
导出
摘要 功耗分析攻击是侧信道分析中针对密码设备最有效的分析手段之一,它利用密码设备消耗的功耗来分析密码设备的敏感信息.差分功耗分析是最早提出的功耗分析方法,也是目前最基本的分析方法之一.但是在实际使用差分功耗分析过程中,由于功耗轨迹存在噪声等因素,往往使得花了较多的功耗轨迹,差分功耗分析的效果一般,难以恢复出正确密钥.针对这个问题,本文提出了一种基于奇异值分解的选择功耗轨迹方法,这种方法可以选择一些质量好的功耗轨迹用于差分功耗分析,提高差分功耗分析的攻击效率.本文的实验验证了该方法的有效性,在同等分析条件下,对于我们自己采集的功耗数据,使用该方法情况下仅需124条功耗轨迹就可以达到80%的成功率,而普通差分功耗分析需要490条;对于DPA Contest 2008/2009提供的数据,使用该方法仅需53条功耗轨迹可以达到80%的成功率,而普通差分功耗分析需要195条.两个不同的实验对象都说明了该方法的有效性. Power analysis is one of the most effective techniques in side channel analysis. This technique utilizes the power consumption that are relative to the intermediate state of cryptographic algorithm to recover the secret information in the cryptographic devices. Differential power analysis is the first method of power analysis and it is one of the most fundamental analysis techniques. However,in practical scenario,the efficiency of differential power analysis is largely affected by the noise of power traces. Consequently,this leads to the lowefficiency of differential power analysis and it is hard to recover the secret key. To address this issue,a newmethod that is based on singular value decomposition to select power traces is proposed. The power traces of high quality can be selected when this method is applied to improve the efficiency of differential power analysis. The experiments verify the validity of the method. Further,the experimental results showthat our method is much better compared with the existing method. Using the method of this paper only 124 power traces is needed to achieve the success rate of 80%,while the normal differential power analysis needs 490 power traces. In addition,when analyzing the data of DPA Contest V1,using the method of this paper only 53 power traces is needed to achieve the success rate of 80%,while the normal differential power analysis needs 195 power traces. Two experiments on different subjects verify the effectiveness of our method.
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第9期2250-2255,共6页 Acta Electronica Sinica
基金 国家自然科学基金项目(No.61372062)
关键词 差分功耗分析 选择功耗轨迹 奇异值分解 differential power analysis selecting power traces singular value decomposition
  • 相关文献

参考文献1

二级参考文献13

  • 1Paul Kocher, "Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems", CRYPTO 1996, Cal- ifornia, USA, LNCS 1109, pp.104-113, 1996.
  • 2Paul Kocher, Joshua Jaffe and Benjamin Jun, "Differential power analysis", CRYPTO 1999, California, USA, LNCS 1666, pp.388-397, 1999.
  • 3Dakshi Agrawal, Bruce Archambeault, et at., "The EM side- channel(s)", CHES 2002, San Francisco Bay (Redwood City), USA, LNCS 2523, pp.29 25, 2002.
  • 4Stefan Mangard, et al., "Power Analysis Attacks: Revealing the Secrets of Smart Cards", Springer, Berlin, 2007.
  • 5X. Charvet and Herve Pelletier, "Improving the DPA attack us- ing wavelet transform", Non-Invasive Attack Testing Workshop 2005, Available at http://csrc.nist.gov/groups/STM/cmvp/doc uments/fips140-3/physec/papers/physecpaper 14.pdf.
  • 6Youssef Souissi, M. Abdelaziz E1 Aabid, Nicolas De- bande, Sylvain Guilley and JeamLuc Danger, "Novel ap- plications of wavelet transforms based side-channel analy- sis", Non-Invasive Attack Testing Workshop 2011, Avail- able at http://csrc.nist.gov/news_events/non-invasive-attack- testing- workshop/papers/01_Souissi.pdf.
  • 7Lejla Batina, Jip Hogenboom and Jasper G.J. van Woudenberg, "Getting more from PCA: First results of using principal com- ponent analysis for extensive power analysis", CT-RSA 2012, San Francisco, USA, LNCS 7178, pp.383-397, 2012.
  • 8Eric Brier, Christophe Clavier and Francis Olivier, "Correlation power analysis with a leakage model", CHES 2004, Cambridge (Boston), USA, LNCS 3156, pp.135-152, 2004.
  • 9Stefan Mangard, Elisabeth Oswald and FX Standaert, "One for all-all for one: Unifying standard differential power analysis attacks", Information Security, Vol.5, No.2, pp.100-110, 2011.
  • 10F.X. Standaert, et al., "A unified framework for the analysis of side-channel key recovery attacks", EUROCRYPTO 2009, Cologne, Germany, LNCS 5479, pp.443-461, 2009.

共引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部