期刊文献+

基于3DES密码算法的差分能量分析攻击方法的研究 被引量:3

Research on Differential Power Analysis Attack Method Based on 3DES Cryptographic Algorithm
下载PDF
导出
摘要 针对基于芯片实现分组密码算法的物理泄漏安全问题,本文对软件实现3DES算法的STM32芯片进行了电磁辐射信号采集,通过差分能量分析攻击成功获取了密钥。实验选择3DES算法Sbox输出作为中间值,在算法的中间值开始运算时,通过芯片引脚输出高电平对示波器进行触发,极大地提高了实验攻击效率。一则实现已采集信号占用最小的存储资源,最大限度只采集中间值运算所对应的区间;二则保证已采集曲线未出现失调,在进行曲线处理时无需进行对齐操作;三则保证了已采集的信号的质量,极大减少攻击所需的曲线数目。实验表明,仅200条电磁信号曲线就能获取1次DES运算的轮密钥,同时反映了芯片存在严重的电磁辐射泄露。 Aiming at the physical leakage security problem based on chip implementation of block cipher algorithm,this paper collects the electromagnetic radiation signal of STM32 chip which implements 3DES algorithm,and we can reveal the key successfully through differential power analysis attack.The experiment selects the 3DES algorithm Sbox output as the intermediate result.When the intermediate result of the algorithm starts to operate,the oscilloscope is triggered by the high level of the chip pin output,which greatly improves the experimental attack efficiency.First of all,the collected signal occupies the smallest storage resource,and only collects the interval corresponding to the intermediate result operation;secondly,it ensures that the acquired Power Trace does not appear to be misaligned,and does not need to perform alignment operation when performing traces processing;At last,The quality of the signal greatly reduces the number of traces required for the attack.Experiments show that only 200 electromagnetic signal traces can reveal the round key of DES operation,and it also reflects the serious electromagnetic radiation leakage of the chip.
作者 周悦 文毅 杨旭 王秀君 李梅 ZHOU Yue;WEN Yi;YANG Xu;WANG Xiu-jun;LI Mei(National Application Software Testing Labs (Beijing Software Testing & QA Center),Beijing 100193,China;School of Information Engineering,China University Of Geosciences,Beijing 100083,China)
出处 《软件》 2019年第9期1-7,共7页 Software
基金 国家自然科学基金资助(项目编号41572347)
关键词 3DES算法 差分能量分析攻击 汉明重量模型 电磁辐射分析 Triple DES Differential power analysis attack Hamming-weight Electromagnetic radiation analysis
  • 相关文献

参考文献5

二级参考文献33

  • 1李翔宇,孙义和.CMOS门电路的功率与数据相关性[J].清华大学学报(自然科学版),2005,45(7):985-988. 被引量:2
  • 2韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 3陈开颜,赵强,张鹏,邓高明.DES加密实现的差分功耗分析仿真[J].军械工程学院学报,2006,18(3):41-43. 被引量:6
  • 4Susan Yong Dave Aitel. The Hacker' s Handbook The Strategy behind Breaking into and Defending Networks.北京:机械工业出版社,2006.
  • 5牛少影,江为强.网络的攻击与防范-理论与实践.北京:北京邮电大学出版社,2006.
  • 6KOCHER P, JAFFE J, JUN B. Differential power, analysis [ C ]// Proc of Advances in Cryptology-CRYPTO. [ S. l. ] . Springer-yerlag, 1999 : 388-397.
  • 7BRIER E, CLAVIER C, OLIVIER F. Correlation power analysis with a leakage model [ C ]//Proc of CHES. Berlin : Springer, 2004 : 16 - 29.
  • 8AGRAWAL D, Jr RAO, ROHATGI P. Multi-channel attacks[ C ]// Proc of the 5th International Workshop on CHES. Berlin: Springer- Verlag,2003:2-16.
  • 9KAMOUN N, BOSSUET L, GHAZEL A. Experimental implementa- tion of DPA attacks on AES design with flash-based FPGA technology [ C ]//Proc of International Multi-Conference on Systems, Signals and Devices. 2009 : 1-4.
  • 10De MULDER E, ORS S B, PRENEEL B, et al. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems [ J]. Elsevier An International Journal Com- puters and Electrical Engineering ,2007,33(5 ) :367-382.

共引文献28

同被引文献26

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部