浏览全部资源
扫码关注微信
成都信息工程大学网络空间安全学院,四川 成都 610225
[ "吴震(1975-),男,江苏苏州人,成都信息工程大学副教授,主要研究方向为信息安全、密码学、侧信道攻击与防御、信息安全设备设计与检测。" ]
[ "杜之波(1982-),男,山东冠县人,成都信息工程大学副教授,主要研究方向为信息安全、侧信道攻击与防御、天线应用和物联网安全。" ]
[ "王敏(1977-),女,四川资阳人,成都信息工程大学副教授,主要研究方向为网络攻防、侧信道攻击与防御。" ]
[ "向春玲(1990-),女,湖北宜昌人,成都信息工程大学助教,主要研究方向为信息安全、嵌入式系统安全、侧信道攻击与防御。" ]
网络出版日期:2018-08,
纸质出版日期:2018-08-25
移动端阅览
吴震, 杜之波, 王敏, 等. 密码芯片基于聚类的模板攻击[J]. 通信学报, 2018,39(8):83-93.
Zhen WU, Zhibo DU, Min WANG, et al. Template attack of Crypto chip based on clustering[J]. Journal on communications, 2018, 39(8): 83-93.
吴震, 杜之波, 王敏, 等. 密码芯片基于聚类的模板攻击[J]. 通信学报, 2018,39(8):83-93. DOI: 10.11959/j.issn.1000-436x.2018130.
Zhen WU, Zhibo DU, Min WANG, et al. Template attack of Crypto chip based on clustering[J]. Journal on communications, 2018, 39(8): 83-93. DOI: 10.11959/j.issn.1000-436x.2018130.
传统的模板攻击需要已知密钥建模等对实验设备完全控制的前置条件来实施攻击,该前置条件限制了模板攻击的应用场景,使模板攻击只能应用于可以控制密钥输入的设备。为了解决该问题,提出了基于聚类的模板攻击方法。该方法根据信息泄露模型的特征对聚类期望最大值(EM)算法进行改造,使改造后的聚类方法能够较为准确地拟合出泄露信息的概率模型,在未知密钥的情况下,即可确定信息泄露的位置。该方法通过建模进行模板匹配,消除了传统模板攻击对已知密钥建模等前置条件的依赖,从而扩大了模板攻击的应用范围。
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions
a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key
the location of information leakage could be determined.Then the attack established the templates in the location
and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems [C ] // Annual International Cryptology Conference . 1996 : 104 - 113 .
KOCHER P , JAFFE J , JUN B . Differential power analysis [C ] // Annual International Cryptology Conference . 1999 : 388 - 397 .
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2004 : 16 - 29 .
CHARI S , RAO J R , ROHATGI P . Template attacks [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2002 : 13 - 28 .
LERMAN L , MEDEIROS S F , VESHCHIKOV N , et al . Semisupervised template attack [C ] // International Workshop on Constructive Side-Channel Analysis and Secure Design . 2013 : 184 - 199 .
SCHINDLER W , LEMKE K , PAAR C . A stochastic model for differential side channel cryptanalysis [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2005 : 30 - 46 .
GIERLICHS B , LEMKE-RUST K , PAAR C . Templates vs.stochastic methods [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2006 : 15 - 29 .
KARSMAKERS P , GIERLICHS B , PELCKMANS K , et al . Side channel attacks on cryptographic devices as a classification problem [J ] . Esat Kuleuven Be , 2009 , 7 :36.
LERMAN L , POUSSIER R , BONTEMPI G , et al . machine learning revisited (and the curse of dimensionality in side-channel analysis) [C ] // International Workshop on Constructive Side-Channel Analysis and Secure Design . 2015 : 20 - 33 .
LERMAN L , BONTEMPI G , MARKOWITCH O . Side channel attack:an approach based on machine learning [J ] . Center for Advanced Security Research Darmstadt , 2011 : 29 - 41 .
BATINA L , GIERLICHS B , LEMKE-RUST K . Differential cluster analysis [M ] // Cryptographic Hardware and Embedded Systems-CHES . 2009 : 112 - 127 .
CHOU J W , CHU M H , TSAI Y L , et al . An unsupervised learning model to perform side channel attack [C ] // Pacific-Asia Conference on Knowledge Discovery and Data Mining . 2013 : 414 - 425 .
HEYSZL J , IBING A , MANGARD S , et al . Clustering algorithms for non-profiled single-Execution attacks on exponentiations [C ] // International Conference on Smart Card Research and Advanced Applications . 2013 : 79 - 93 .
LEMKE-RUST K , PAAR C . Gaussian mixture models for higher-order side channel analysis [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2007 : 14 - 27 .
MANGARD S , OSWALD E , POPP T . Power analysis attacks:revealing the secrets of smart card [M ] . New York:Springer . 2007 .
STANDAERT F X , MALKIN T G , YUNG M . A unified framework for the analysis of side-channel key recovery attacks [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . 2009 : 443 - 461 .
0
浏览量
1129
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构