期刊文献+

针对掩码AES的选择明文和二阶DPA组合攻击 被引量:2

Chosen Plaintext and Second-order Differential Power Analysis Combination Attack on Masked AES
下载PDF
导出
摘要 AES算法已经被广泛的应用于商业密码领域,未加防护的AES算法可被DPA攻击.掩码是一种有效的抗DPA攻击防护措施,尤其是采用全掩码技术后,常规DPA无法对其成功实施攻击.本文提出了一种选择明文和二阶DPA的组合攻击方法(CSDCA),可成功实施对全掩码AES电路的侧信道攻击.首先利用选择明文的方式降低密钥遍历的空间,由128比特降至每8比特分组进行攻击;同时,选择初始轮的轮输出和第一轮的轮输出作为中间值,采用二阶DPA技术,去除掩码防护,从而成功攻击掩码防护.实验结果表明:对于采用SASEBO板仿真实现的全掩码AES算法,应用CSDCA方法后,采集6万条曲线一小时即可获得密钥.相比于传统的二阶DPA攻击,本方法攻击成功所需的曲线条数(攻击所需时间)可降低94%(由100万条降低至6万条);该方法与业界常用方法(毛刺DPA攻击)相比,曲线条数(攻击时间)可降低79%(由28万条降低至6万条). The algorithm of AES has been widely used in industry, and unprotected AES algorithm is vulnerable against DPA attack. For the security of AES chip, designers usually use the masking technique as a countermeasure against DPA attack, especially the technique of whole data path masking, which is secure against traditional DPA. This paper proposed a Chosen plaintext and Second-order Differential power analysis Combination Attack(CSDCA). This method can reduce key space to a normal level that an adversary can derive the 8-bit key at a time. Then, take two values into account for removing mask which is second-order DPA, it can lunch a successful attack on masked AES. Experiments show that, implementation of AES with whole data path masking using the SASEBO motherboard, by applying the CSDCA method, only 60,000 measurements are needed to get the AES key in an hour. Compared with the traditional second-order DPA, our CSDCA reduces the number of measurements down to about 94% for a successful attack. Moreover, compared with the common method in academic, CSDCA reduces the number of measurements down to about 79% for a successful attack.
出处 《密码学报》 2014年第6期525-536,共12页 Journal of Cryptologic Research
基金 质检公益性行业科研专项经费资助项目(201310033) 网域空间身份证eID管理技术及系统(2012AA01A403)
关键词 选择明文攻击 二阶DPA AES 掩码 组合攻击 chosen plaintext attack second-order DPA AES masking combination attack key word
  • 相关文献

同被引文献19

  • 1Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999
  • 2Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards. . 2008
  • 3Messerges T S.Securing the AES finalists against power analysis attacks. Fast Software Encryption . 2001
  • 4Kai Schramm,Christof Paar.Higher Order Masking of the AES. CT-RSA 2006 . 2006
  • 5Oswald E,Mangard S,Herbst C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers. Topics in Cryptology-CT-RSA 2006 . 2006
  • 6Benedikt Gierlichs,Lejla Batina,Bart Preneel,Ingrid Verbauwhede.Revisiting Higher-Order DPA Attacks. Topics in Cryptology-CT-RSA 2010 . 2010
  • 7Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis. Journal of Cryptographic Engineering . 2011
  • 8WANG S T,GU D W,LIU J R,et al.A Power Analysis on SMS4 Using the Chosen Plaintext Method. 2013 9th International Conference on Computational Intelligence and Security (CIS) . 2013
  • 9QIU S,BAI G Q.Power analysis of a FPGA implementation of SM4. 2014 International Conference on Computing Communication and Networking Technologies (ICCCNT) . 2014
  • 10BAI X F,XU Y,GUO L.Securing SMS4 Cipher against differential power analysis and its VLSI implementation. 11th IEEE Singapore International Conference on Communication Systems—ICCS 2008 IEEE . 2008

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部