浏览全部资源
扫码关注微信
1. 成都信息工程大学信息安全工程学院,四川 成都 610225
2. 内江师范学院计算机科学学院,四川 内江 641100
[ "杜之波(1982-),男,山东冠县人,成都信息工程大学讲师,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。" ]
[ "孙元华(1982-),男,山东冠县人,博士,内江师范学院讲师,主要研究方向为天线设计、信息安全和物联网安全。" ]
[ "王燚(1968-),男,四川成都人,博士,成都信息工程大学教授,主要研究方向为机器学习、侧信道攻击与防御、自然语言处理。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
杜之波, 孙元华, 王燚. 针对AES密码算法的多点联合能量分析攻击[J]. 通信学报, 2016,37(Z1):78-84.
Zhi-bo DU, UNYuan-hua S, ANGYi W. Multi-point joint power analysis attack against AES[J]. Journal on communications, 2016, 37(Z1): 78-84.
杜之波, 孙元华, 王燚. 针对AES密码算法的多点联合能量分析攻击[J]. 通信学报, 2016,37(Z1):78-84. DOI: 10.11959/j.issn.1000-436x.2016251.
Zhi-bo DU, UNYuan-hua S, ANGYi W. Multi-point joint power analysis attack against AES[J]. Journal on communications, 2016, 37(Z1): 78-84. DOI: 10.11959/j.issn.1000-436x.2016251.
针对 AES 密码算法的单个信息泄露点能量分析攻击,传统攻击方法没有尽可能多地利用算法和能量曲线中对攻击有用的信息,导致这种攻击存在所需曲线条数多、攻击信息利用率低等诸多问题。提出一种针对AES密码算法的多点联合能量分析攻击方法,并以相关性能量分析攻击为例,给出详细的攻击过程。攻击的同时选择轮密钥加和字节变换作为能量分析攻击的中间变量,构建关于该变量的联合能量泄露函数,实施多点联合的相关性能量分析攻击。针对智能卡上软实现的 AES 密码算法,分别进行联合能量分析攻击,针对轮密钥加和字节变换单个信息泄露点的相关性能量分析攻击实验,实验结果不仅验证了本攻击方法的有效性,而且证实联合能量分析攻击相比针对单个信息泄露点的能量分析攻击具有成功率高、所需攻击曲线条数少等优点。
For the power analysis attack of the AES cryptographic algorithm with the single information leakage point
the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as required more power traces
the low utilization rate of information and so on.A novel method of muti-point joint power analysis attack against AES was proposed to solve the problems.And taking the correlation power analysis attack as an example
the detailed attack process was presented.The operations of the round key addition and the SubBytes were chosen as the attack intermediate variable at the same time.Then the joint power leakage function was con-structed for the attack intermediate variable.And the multi-point joint correlation energy analysis attack was given.Aiming at the AES cryptographic algorithm implemented on the smart card
the multi-point joint power analysis attack
the correlation power analysis attack with the single information leakage point in the key addition and the SubBytes were conducted.The measured results validate the proposed method is effective.It also shows that the proposed method has the advantages of high success rate and less power traces comparing with the single information leakage point.
KOCHER P C . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]//Advances in Cryptology . 1996 : 104 - 113 .
KOCHER P C , JAFFE J , JUN B . Differential power analysis [M ] . Berlin:Springer , 1999 : 388 - 397 .
QUISQUATER J J . A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions,the SEMA and DEMA methods [J ] . Eurocrypt 2000 Rump Session , 2000 .
BONEH D , DEMILLO R A , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]//International Confer-ence on Theory & Application of Cryptographic Techniques . 1997 : 37 - 51 .
STANDAERT F X , MALKIN T G , LIPTON R J . On the importance of checking cryptographic protocols for faults[C]//International Confer-ence on Theory & Application of Cryptographic Techniques . 1997 : 37 - 51 .
ABID T , ALI M . Differential power analysis countermeasure for improved DES with dynamic key management [J ] . Bahria Univer-sity Journal of Information & Communication Technology , 2015 , 8 ( 2 ): 15 - 21 .
MANGARD S . A simple power-analysis (SPA) attack on implementa-tions of the AES key expansion[C]//International Conference on In-formation Security and Cryptology . 2002 : 343 - 358 .
ORS S B , GURKAYNAK F , OSWALD E , et al . Power-analysis attack on an ASIC AES implementation[C]//International Confer-ence on Information Technology:Coding and Computing . 2004 : 546 - 552 .
OSWALD E , MANGARD S , HERBST C , et al . Practical sec-ond-order DPA attacks for masked smart card implementations of block ciphers[C]//Cryptographers' Track at The RSA Conference . 2006 : 192 - 207 .
向春玲 , 吴震 , 饶金涛 , 等 . 针对一种 AES 掩码算法的频域相关性能量分析攻击[J].计算机工程 [J ] . 计算机工程 , 2016 , 42 ( 10 ): 146 - 150 .
XIANG C L , WU Z , RAO J T , et al . Correlation power analysis attack in frequency domain for an AES mask algorithm [J ] . Computer Engi-neering , 2016 , 42 ( 10 ): 146 - 150 .
OSWALD E , MANGARD S , PRAMSTALLER N , et al . A side-channel analysis resistant description of the AES S-box[C]//International Workshop on Fast Software Encryption . 2005 : 413 - 423 .
BONNECAZE A , LIARDET P , VENELLI A . AES side-channel coun-termeasure using random tower field constructions [J ] . Designs,codes and Cryptography , 2013 , 69 ( 3 ): 331 - 349 .
OSVIK D A , SHAMIR A , TROMER E . Cache attacks and counter-measures:the case of AES[C]//Cryptographers' Track at the RSA Conference . 2006 : 1 - 20 .
MANGARD S , SCHRAMM K . Pinpointing the side-channel leak-age of masked AES hardware implementations[C]//International Workshop on Cryptographic Hardware and Embedded Systems . 2006 : 76 - 90 .
MORADI A , MISCHKE O , EISENBARTH T . Correlation-enhanced power analysis collision attack[C]//International Workshop on Cryp-tographic Hardware and Embedded Systems . 2010 : 125 - 139 .
杜之波 , 吴震 , 王敏 , 等 . 针对 SM4 轮输出的改进型选择明文功耗分析攻击 [J ] . 通信学报 , 2015 , 36 ( 10 ): 85 - 91 .
DU Z B , WU Z , WANG M , et al . Improved chosen-plaintext power analysis attack against SM4 at the round-output [J ] . Journal on Com-munications , 2015 , 36 ( 10 ): 85 - 91 .
王敏 , 杜之波 , 吴震 , 等 . 针对 SMS4 轮输出的选择明文能量析攻击 [J ] . 通信学报 , 2015 , 36 ( 1 ): 20150016 .
WANG M , DU Z B , WU Z , et al . Chosen-plaintext power analysis at-tack against SMS4 with the round-output as the intermediate data [J ] . Journal on Communications , 2015 , 36 ( 1 ): 20150016 .
杜之波 , 吴震 , 王敏 , 等 . 针对SM4密码算法的多点联合能量分析攻击 [J ] . 计算机研究与发展 , 2016 , 53 ( 10 ): 2224 - 2229 .
DU Z B , WU Z , WANG M , et al . Multi-point joint power analysis at-tack against SM4 [J ] . Journal of Computer Research and Development , 2016 , 53 ( 10 ): 2224 - 2229 .
MANGARD S , OSWALD E , POPP T . Power analysis attacks:reveal-ing the secrets of smart cards [M ] . Berlin:Springer , 2008 .
杜之波 , 吴震 , 王敏 , 等 . 针对基于 SM3 的 HMAC 的能量分析攻击方法 [J ] . 通信学报 , 2016 , 37 ( 5 ): 38 - 43 .
DU Z B , WU Z , WANG M , et al . Power analysis attack of HMAC based on SM3 [J ] . Journal on Communications , 2016 , 37 ( 5 ): 38 - 43 .
0
浏览量
1155
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构