期刊文献+

AES高阶掩码方案抗功耗攻击

Anti Power Attack of AES High-order Mask Scheme
下载PDF
导出
摘要 随着密码技术和信息技术的发展,目前的密码算法本身已足够强大,能够对抗传统的密码分析手段,但由于设备本身的工艺特性,其运行时会泄露如功耗、电磁、时间等信息,这些信息能够被攻击者利用从而破解密钥,该方法称为侧信道攻击。AES加密算法容易受到侧信道攻击,为了解决该问题,通常通过添加一个或几个随机值即掩码。当设计d阶时每个值都用到掩码,执行SCA的复杂度呈指数增长,因此设计d阶为安全参数的掩码方案对密码实现的物理安全性有重要意义。根据AES常用的功耗攻击技术,提出了一种d阶掩码方案,此方案是基于Ishai等人在Crypto发表的面向硬件的掩码方案。与此方案相比,所设计的方案可以在处理器上有效的实现。实验结果表明,该方案降低了理论功耗和实践功耗之间的相关性,很好地保护了中间值不被泄露,提高了AES加密算法的抗功耗攻击能力。 Along with the development of the password technology and information technology, the current password algorithm itself is strong enough to against the traditional means of password analysis, but due to the technological characteristics of the device itself, its runtime leaked information, such as power consumption, electromagnetic, time, which can be used to break key attackers. This method is called the side channel attacks. AES algorithm is vulnerable to side channel attack. In order to solve this problem, one or more random values are added, namely masks. Masks are used for each value when d-order is designed, and the complexity of SCA execution increases exponentially. Therefore, it is of great significance to design a mask scheme with d-order as a security parameter for the physical security of cryptographic implementation. We propose a d-order mask scheme based on the hardware-oriented mask scheme published by Ishai et al. in Crypto, based on the commonly used power attack technology of AES. Compared with this scheme, the proposed scheme can be effectively implemented on the processor. The experimental results show that the proposed scheme reduces the correlation between theoretical power consumption and practical power consumption, protects the intermediate value from leakage, and improves the anti-power attack ability of AES encryption algorithm.
作者 何利文 国海轮 安聪 HE Li-wen;GUO Hai-lun;AN Cong(Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
机构地区 南京邮电大学
出处 《计算机技术与发展》 2022年第5期68-74,共7页 Computer Technology and Development
基金 2018年国家重点研发计划项目(2018YFB2100200)。
关键词 AES加密 侧信道攻击 CPA 高阶掩码 功耗攻击 AES encryption side channel attack CPA high-order mask power consumption attack
  • 相关文献

参考文献2

二级参考文献21

  • 1赵佳,曾晓洋,韩军,王晶,陈俊.抗差分功耗分析攻击的AES算法的VLSI实现[J].计算机研究与发展,2007,44(3):378-383. 被引量:7
  • 2Stefan Mangard. Securing implementations of block ciphers against side channel attacks [D]. Austria: Graz University of Technology, 2004
  • 3Kocher P, Jaffe J, Jun B. Differential power analysis [G]// LNCS 1666: Advances in Cryptology(CRYPTO'99). Berlin: Springer, 1999:388-397
  • 4Akkar M, Giraud C. An implementation of DES and AES, Secure against some Attacks [G]//LNCS 2162: CHES 2001. Berlin: Springer, 2001: 309-318
  • 5Jovan Dj Golic, Christophe Tymen. Multiplicative masking and power analysis of AES [G] //LNCS 2523: Cryptographic Hardware and Embedded System. Berlin: Springer, 2003: 198-212
  • 6Johannes Blomer, Jorge Guajardo Merchan, Volker Krummel. Provably Secure Masking of AES [G]//LNCS 3357: SAC 2004. Berlin: Springer, 2005:69-83
  • 7Akashi Satoh, Sumio Morioka, Kohji Takano, et al. A compact rijndael hardware architecture with S-Box optimization [G]//LNCS 2248: ASIACRYPT 2001. Berlin: Springer, 2001:239-254
  • 8Christoph Herbst, Elisabeth Oswald, Stefan Mangard. An AES smart card implementation resistant to power analysis attacks [G] //LNCS 3989: ACNS 2006. Berlin: Springer, 2006, 239-252
  • 9Tiri K. Design for side-channel attack resistant security ICs [D]. Los Angeles: University of California, 2005
  • 10National Institute of Standards and Technology. Advanced Encryp-tion Standard ( AES) [ S/OL] ? [ 2013- 06- 20]. http: //csrc. nist.gov/publications/fips/fipsl 97/fips-l 97. pdf.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部