摘要
针对基于芯片实现分组密码算法的物理泄漏安全问题,本文对软件实现3DES算法的STM32芯片进行了电磁辐射信号采集,通过差分能量分析攻击成功获取了密钥。实验选择3DES算法Sbox输出作为中间值,在算法的中间值开始运算时,通过芯片引脚输出高电平对示波器进行触发,极大地提高了实验攻击效率。一则实现已采集信号占用最小的存储资源,最大限度只采集中间值运算所对应的区间;二则保证已采集曲线未出现失调,在进行曲线处理时无需进行对齐操作;三则保证了已采集的信号的质量,极大减少攻击所需的曲线数目。实验表明,仅200条电磁信号曲线就能获取1次DES运算的轮密钥,同时反映了芯片存在严重的电磁辐射泄露。
Aiming at the physical leakage security problem based on chip implementation of block cipher algorithm,this paper collects the electromagnetic radiation signal of STM32 chip which implements 3DES algorithm,and we can reveal the key successfully through differential power analysis attack.The experiment selects the 3DES algorithm Sbox output as the intermediate result.When the intermediate result of the algorithm starts to operate,the oscilloscope is triggered by the high level of the chip pin output,which greatly improves the experimental attack efficiency.First of all,the collected signal occupies the smallest storage resource,and only collects the interval corresponding to the intermediate result operation;secondly,it ensures that the acquired Power Trace does not appear to be misaligned,and does not need to perform alignment operation when performing traces processing;At last,The quality of the signal greatly reduces the number of traces required for the attack.Experiments show that only 200 electromagnetic signal traces can reveal the round key of DES operation,and it also reflects the serious electromagnetic radiation leakage of the chip.
作者
周悦
文毅
杨旭
王秀君
李梅
ZHOU Yue;WEN Yi;YANG Xu;WANG Xiu-jun;LI Mei(National Application Software Testing Labs (Beijing Software Testing & QA Center),Beijing 100193,China;School of Information Engineering,China University Of Geosciences,Beijing 100083,China)
出处
《软件》
2019年第9期1-7,共7页
Software
基金
国家自然科学基金资助(项目编号41572347)