期刊文献+

结合协方差与变异系数的密码芯片能量泄漏评估模型 被引量:1

Energy Leakage Evaluation Model of Cryptographic Chip Combining with Covariance and Variation Coefficient
下载PDF
导出
摘要 在信息技术安全性评估通用准则中,必须使用具体的侧信道分析方法来评估密码芯片工作时的能量泄漏情况。为降低评估过程对侧信道分析方法的依赖性,通过分析能量迹各点之间的关系,构建一种基于协方差矩阵变异系数的能量泄漏评估模型。利用协方差矩阵度量能量迹各点间的线性关系,并引入变异系数衡量矩阵内各元素的差异程度,从而评估芯片工作时的能量泄漏情况。基于DPA contest v2、SAKURA-G、DPA contest v4和ATMEGA2560数据集的实验结果验证了该模型的有效性。与现有密码芯片能量泄漏评估模型相比,其具有操作简单和可行性强的优点,可使实验人员无需深入了解侧信道分析知识背景即可快速评估芯片能量消耗情况。 The existing security evaluation criteria Common Criteria(CC)need a specific side-channel analysis method to assess the energy leakage of a working chip.In order to reduce the dependence on specific channel analysis methods,this paper proposes an energy leakage evaluation model based on variation coefficient by analyzing the relationship of points on power traces.In this model,the covariance matrix is used to measure the linear relationship among the points and the coefficient of variation is introduced to measure difference of the elements in the covariance matrix,so as to evaluate the energy leakage.Experimental results based on DPA contest v2,SAKURA-G,DPA contest v4,and ATMEGA2560 datasets verify the effectiveness of the model.Compared with the existing energy leakage evaluation models of cryptographic chip,this model has the advantages of simple operation and high feasibility.It enables researchers without a thorough understanding of side channel analysis.
作者 蔡爵嵩 严迎建 朱春生 CAI Juesong;YAN Yingjian;ZHU Chunsheng(School of Cryptographic Engineering,PLA Information Engineering University,Zhengzhou 450002,China)
出处 《计算机工程》 CAS CSCD 北大核心 2021年第3期37-42,52,共7页 Computer Engineering
基金 国家自然科学基金(61404175)。
关键词 侧信道分析 能量泄漏 安全性评估通用准则 协方差矩阵 变异系数 side-channel analysis energy leakage security evaluation Common Criteria(CC) covariance matrix variation coefficient
  • 相关文献

参考文献3

二级参考文献17

  • 1Kocher P, Jaffe J, Jun B. Differential power analysis[C]//Proc CRYPTO'99. Berlin Heidelberg:Springer-Verlag, 1999:388-397.
  • 2Kocher P. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]//Proc CRYPTO'96. Berlin Heidelberg:Springer-Verlag, 1996:104-113.
  • 3CCMB-2012-09-001. Common Criteria for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/cc/.
  • 4CCMB-2012-09-001. Common methodology for information technology security evaluation[S/OL]. (2012-09). http://www.commoncriteriaportal.org/files/ccfiles/CEMV3.1R4.pdf.
  • 5CCDB-2013-05-002. Supporting document-mandatory technical document:application of attack potential to smartcards[S/OL]. (2013-05). http://www.commoncriteriaportal.org/files/supdocs/CCDB-2013-05-002.pdf.
  • 6Mather L, Oswald E, Bandenburg J, et al. Does my device leak information? An a priori statistical power analysis of leakage detection tests[C]//Proc Advances in Cryptology-ASIACRYPT 2013. Berlin Heidelberg:Springer-Verlag, 2013:486-505.
  • 7Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side channel resistance validation[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
  • 8Jaffe J, Rohatgi P, Witteman M. Efficient side-channel testing for public key algorithms:RSA case study[C]//Proc NIAT 2011. Gaithersburg:NIST, 2011.
  • 9Easter R, Quemard J-P, Sakurai G. ISO/IEC DIS 17825:Information technology-Security technique-Testing methods for the mitigation of non-invasive attack classes against cryptographic modules[Z]. Berlin:DIN, 2014-12-01.
  • 10Chothia T, Guha A. A statistical test for information leaks using continuous mutual information[C]//Proc Computer Security Foundations Symposium (CSF). Piscataway, NJ:IEEE Press, 2011:177-190.

共引文献160

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部