期刊文献+

针对AES加密算法的安全检测 被引量:3

Security Detection of AES Encryption Algorithm
下载PDF
导出
摘要 侧信道攻击(side channel attack, SCA)是一种新兴的密码分析方法,主要通过加密软件或硬件运行时产生的各种泄漏信息获取密文信息,其中相关功耗分析(CPA)是较为强大的一种攻击方法,可以用来实现AES加密算法的安全检测。CPA需要假设猜测密钥,然后根据示波器采集到的能量迹,使用具有数据相关性的汉明模型,并计算实际能量值与假设能量消耗之间的皮尔逊相关系数,利用皮尔逊相关系数来判断猜测密钥的正确与否。CPA可以把皮尔逊相关系数的计算结果限制在[-1,1]之间且CPA过程自带标准化,不需要额外对数据进行标准化。此外,还利用python的pandas库和style方法对获得的结果进行刻画,更好地实现了相关系数和正确的密钥之间的关系。本案例使用NewAE Technology Inc的芯片物理攻击平台ChipWhisperer实施CPA攻击来检测加密算法的安全性,成功破解了预设的AES-128的16字节的密钥。实验表明,CPA在针对未加防护的AES加密算法时有显著的效果,可以检测AES加密算法的安全性。 Side channel attack(SCA) is a new cryptanalysis method, which mainly obtains ciphertext information through various leakage information generated by encryption software or hardware during operation. Among them, correlation power analysis(CPA) is a relatively powerful attack method, which can be used to realize the security detection of AES encryption algorithm. CPA needs to guess the key hypothesis, and then according to the energy trace collected by the oscilloscope, the Hamming model with data correlation is used, and the Pearson correlation coefficient between the actual energy value and the assumed energy consumption is calculated, and the Pearson correlation coefficient is used to judge the correctness of the guess key. CPA can limit the calculation result of Pearson correlation coefficient to between [-1,1] and the CPA process has its own standardization, so there is no need for additional standardization of data. In addition, we also use Python’s Pandas library and style method to characterize the results obtained, better realizing the relationship between the correlation coefficient and the correct key. This case uses NewAE Technology Inc’s chip physical attack platform ChipWhisperer to implement CPA attack to detect the security of encryption algorithm, and successfully cracked the preset 16-byte key of AES-128. The experiment shows that CPA has a significant effect on the unprotected AES encryption algorithm, and can detect the security of the AES encryption algorithm.
作者 何利文 安聪 国海轮 HE Li-wen;AN Cong;GUO Hai-lun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China)
机构地区 南京邮电大学
出处 《计算机技术与发展》 2022年第5期87-92,129,共7页 Computer Technology and Development
基金 2018年国家重点研发计划项目(2018YFB2100200)。
关键词 ChipWhisperer 高级加密标准 能量迹 相关功耗分析 相关系数 ChipWhisperer advanced encryption standard trace correlation power analysis correlation coefficient
  • 相关文献

参考文献4

二级参考文献46

  • 1陈开颜,赵强,张鹏,周开民.集成电路芯片信息泄漏旁路分析模型[J].微计算机信息,2006(06S):74-75. 被引量:2
  • 2张蕾,吴文玲.SMS4密码算法的差分故障攻击[J].计算机学报,2006,29(9):1596-1602. 被引量:67
  • 3国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 4Kocher P. Timing attacks on implementations of Diffie Hellman, RSA, DSS, and other systems[C]// Proceedings Crypto' 96: Advances in Cryptology. New York: Springer Verlag, 1996: 104-113.
  • 5Gandolfi K, Mourtel C, Olivier F. Electromagnetic analysis., concrete results[C]//Proc of Cryptographic Hardware and Embedded Systems (CHES 2001). Pairs: Springer, 2001:251-261.
  • 6Quisquater J J, Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards[C] // Smart Cards Programming and Security International Conference on Research in Smart Cards. Berlin/Heidelberg: Springer, 2001:200-210.
  • 7Kocher P, Jaffe J, Jun B. Differential power analysis [C]//Proc of Advances in Cryptology. Santa Barbara: Springer-Verlag, 1999: 388-397.
  • 8Mangard S, Oswald E, Popp T. Power analysis attacks-revealing the secrets of smart cards[M]. New York: Springer, 2007.
  • 9Kocher P, Jaffe J, Jun B. Differential power analysis:Leaking secrets//Proceedings of the CRYPTO 1999. LNCS1666. Santa Barbara, California, USA, 1999: 388-397.
  • 10Renauld M, Standaert F X. Algebraic side-channel attacks//Proceedings of the INSCRYPT 2009. LNCS 6151. Beijing,China, 2009: 393-410.

共引文献17

同被引文献38

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部