期刊文献+

基于高级加密标准的远场电磁旁路攻击

Far field electromagnetic side channel attack based on advanced encryption standard
下载PDF
导出
摘要 电磁旁路攻击是旁路攻击中的一种有效方法,为了克服传统的电磁旁路攻击必须近距离获取电磁信息的局限性,针对没有电磁防护的密码设备提出一种基于相关性分析的远场攻击方法.使用微控制器运行高级加密标准算法,使用天线在远场探测电磁信号,先对采集的电磁信号均值和滤波以减少噪声的影响,再使用相关性分析方法进行旁路攻击,在天线距离微控制器10 m处成功破解出完整的密钥.同时也对远场电磁旁路攻击中的频率和样本量做了深入研究,带有密钥信息的电磁旁路主要集中在一段频率范围内,而且随着样本量的增加密钥信息越明显,以此为基础结合密码芯片产生密钥信息泄露的机理,提出了改进的电磁旁路攻击方法. Electromagnetic side channel attack is an effective method in side channel attack. In order to overcome the limitations of traditional electromagnetic side channel attacks that must be acquired at close distance, a far field attack method based on correlation analysis is proposed for cryptographic devices without electromagnetic protection. The microcontroller running the advanced encryption standard(AES) and the antenna detecting the signal in the far field were used in our experiment. Before perform the side channel attack, we take the average value and filter the collected signal to reduce the influence of noise. Successfully we crack all 16-byte keys at 10 m. At the same time, the frequency and sample size of the far field electromagnetic side channel attack are deeply studied. In fact, the electromagnetic side channel with key information mainly concentrates in a frequency range, and the the key information is more obvious with the increase of sample size. Based on this, an improved electromagnetic side channel attack method is proposed combining with the mechanism of key information leakage generated by cryptographic chips.
作者 孔凡同 郭承军 田忠 KONG Fantong;GUO Chengjun;TIAN Zhong(Research Institute of Electronic Science and Technology,University of Electronic Science and Technology of China,Chengdu 611731,China)
出处 《电波科学学报》 EI CSCD 北大核心 2019年第5期574-581,共8页 Chinese Journal of Radio Science
关键词 密码破解 旁路攻击 电磁辐射 高级加密标准 远场 相关性电磁分析 password cracking Side channel attack electromagnetic radiation AES far field, CEMA
  • 相关文献

参考文献4

二级参考文献39

  • 1黄易冬,沈廷芝,朱亚平.SELinux安全机制和安全目的研究[J].微计算机信息,2004,20(7):115-117. 被引量:3
  • 2孟昭敦.电磁场导论[M].北京:中国电力出版社,2007.
  • 3Quisquater J J, Samyde D. Electromagnetic analysis (EMA).. measures and counter-measures for smard cards[C]// Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, LNCS 2140. Berlin/Heidelberg: Springer, 2001: 200-210.
  • 4Agrawal D, Archambeault B, Rao J R, et al. The EM side-channel(s) : attacks and assessment methodologies[C] //Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523. Berlin/Heidelberg: Springer, 2003: 29-45.
  • 5Peeters E, Standaert F X, Quisquater J J. Power and electromagnetic analysis., improved model, consequences and comparisons [J]. The VLSI Journal.. Embedded Cryptographic Hardware, 2007, 40 (1) :52-60.
  • 6Mulder E D, Ors S B, Preneel B, et al. Differential power and electromagnetic attacks on a FPGA imple- mentation of elliptic curve cryptosystems[J]. Computers and Electrical Engineering, 2007, 33 (5-6) : 367-382.
  • 7Sauvage L, Guilley S, Mathieu Y. Electromagnetic radiations of FPGAs: high spatial resolution cartography and attack of a cryptographic module[J]. ACM Transactions on Reconfigurable Technology and Systems, 2009, 2(1): 1-24.
  • 8Kim Changkyun, Schlaffer M, Moon S. Differential side channel analysis attacks on FPGA implementations of ARIA[J]. ETRI Journal: Information, Telecommunications & Electronics, 2008, 30 (2) : 315- 325.
  • 9Kocher P, Jaffe J, Jun B. Differential power analysis [C] //Advances in Cryptology-CRYPTO' 99, LNCS 1666. Berlin/Heidelberg: Springer, 1999: 388-397.
  • 10Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model[C]//Proceedings of Cryptographic Hardware and Embedded Systems CHES 2004, LNCS 3156. Berlin/Heidelberg Springer, 2004.. 16-29.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部