摘要
为提升旁路攻击对分组密码算法硬件实现电路的攻击效果,增大正确密钥与错误密钥间的区分度,提出一种针对分组密码的旁路攻击方法。结合差分功耗分析(DPA)攻击和零值攻击的特点,通过分类来利用尽可能多的功耗分量,以攻击出全部密钥。在FPGA上实现AES硬件电路并进行实验,结果表明,在20万条全随机明文曲线中,该方法恢复出了全部密钥,相比DPA攻击方法,其正确密钥与错误密钥间的区分度更大。
In order to improve the effect of Side Channel Attacks(SCAs)on the hardware implementation of block cipher algorithm,and increase the discrimination between correct keys and wrong keys,this paper proposes a SCAs method for block ciphers.This method combines the characteristics of Differential Power Analysis(DPA)attack and zero-value attack,and utilizes as many power components as possible through classification,thus obtaining all keys by attacking.Then,the AES hardware circuit is implemented on the FPGA and experiments are carried out.The results show that the proposed method successfully recovers all keys in 200,000 full random plaintext curves.Besides,the correct keys and wrong keys are more distinguishable in this method than those in the DPA attack method.
作者
朱文锋
王琴
郭筝
刘军荣
ZHU Wenfeng;WANG Qin;GUO Zheng;LIU Junrong(School of Microelectronics,Shanghai Jiao Tong University,Shanghai 200240,China;Zhixun Cipher(Shanghai)Detection Technology Co.,Ltd.,Shanghai 201100,China)
出处
《计算机工程》
CAS
CSCD
北大核心
2020年第1期102-107,113,共7页
Computer Engineering
基金
国家自然科学基金“针对S芯片验证模块引脚信息的自动分析技术”(U1536103)
上海市闵行区中小企业技术创新计划“基于区块链技术的金融业务平台”(2018MH110)
关键词
旁路攻击方法
硬件实现
分组密码算法
组合逻辑功耗
信噪比
Side Channel Attacks(SCAs)method
hardware implementation
block cipher algorithm
combinational logic power
Signal to Noise Ratio(SNR)