期刊文献+

基于巴特沃斯滤波算法的侧信道分析

Side-channel Analysis based on Butterworth Filtering Algorithm
下载PDF
导出
摘要 基于巴特沃斯滤波算法在现场可编程逻辑门阵列(FPGA)侧信道攻击中的使用,主要利用巴特沃斯滤波算法对功耗曲线进行预处理,然后用神经网络模型代替传统模板攻击的统计模型对功耗曲线进行侧信道攻击.该算法对模板攻击,随机方法,深层感知器以及深层卷积神经网络的功耗曲线预处理具有普适性,在实验部分针对DPA CONTEST V2数据进行了4种侧信道方法的分析,实验数据表明该方法提高了可攻击的信噪比,同时提高了侧信道攻击的成功率. This paper introduced Butterworth filtering algorithm in field programmable logic gate aiTay(FPGA)side channel attack.The power curve was preprocessed by Butterworth filtering algorithm,and the power curve was cittacked by side channel using neural network model instead of traditional template model.This algorithm is universal for the power curve pretreatment of template attack,random method,deep perceptron and deep convolutional neural network,based on the experimental section in view of the DPA CONTEST2 data which were analyzed in four methods of side channel,the experimental data showed that the method increases the signal-to-noise ratio(SNR)attacked available,and improves the success rate of side channel attack.
作者 于天凯 王敏 王燚 吴震 杜之波 习伟 YU Tiankai;WANG Min;WANG Yi;WU Zhen;DU Zhibo;XI Wei(School of Cybersecurity,Chengdu University of Information Technology,Chengdu 610225,China;China southern power grid science research institute Co.,Ltd.,Guangzhou 510080,China)
出处 《成都信息工程大学学报》 2020年第1期1-6,共6页 Journal of Chengdu University of Information Technology
基金 国家重点研发计划资助(2018YFB0904900,2018YFB0904901) “十三五”国家密码发展基金资助项目(MMJJ20180244) 四川省重点研发项目(2019YFG0096)。
关键词 FPGA 巴特沃斯滤波 侧信道攻击 FPGA Butterworth filtering side channel attack
  • 相关文献

参考文献4

二级参考文献23

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 2PAUL K, JOSHUA J, BENJAMIN J. Differential power analysis[A]. Proceedings of the 19th Annual International Cryptology Conferenee on Advances in Cryptology[C]. 1999. 388- 397.
  • 3ERIC B, CHRISTOPHE C, FRANCIS O. Correlation power analysis with a leakage model[A]. Proceeding of 6th International Workshop Cambridge[C]. M_A, USA, 2004.16-29.
  • 4CHEN A D, XU S, CHEN Y, et al, CoUision-based chosen-message simple power clustering attack algorithm[J]. China Communications, 2013,10(5):114-119.
  • 5BAI X F, XU Y H, GUO L. Securing SMS4 cipher against differential power analysis and its VLSI implementation[A]. Proceedings of llth IEEE International Conference on Communication Systems[C]. 2008. 167-172.
  • 6WANG S T, GU D W, LIU J R, et al. A power analysis on SMS4 using the chosen plaintext method[A]. 2013 Ninth International Conference on Computational Intelligence and Security[C]. Springer, 2013.748-752.
  • 7SURESH C, JOSYULA R R, PANK-J R. Template attacks[A]. Pro- ceedings of 4th International Workshop Redwood Shores[C]. CA, USA, 2003;13-28.
  • 8BRIER E, CLAVIER C, OLMER F. Correlation power analysis with a leakage module[A]. Proc.ecdings of 6th International Workshop Cambridge[C]. MA, USA, 2004. 125-134.
  • 9PAUL K. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]//CRYPTO 1996. Berlin, c1996:104-113.
  • 10PAUL K, JOSHUA J, BENJAMIN J. Differential power analysis[C]// The 19th Annual International Cptology Conference on Advances in Cryptology. c1999: 388-397.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部