Mutual information power analysis attack in the frequency domain of the crypto chip
Academic paper|更新时间:2024-06-05
|
Mutual information power analysis attack in the frequency domain of the crypto chip
Journal on CommunicationsVol. 36, Issue Z1, Pages: 131-135(2015)
作者机构:
成都信息工程大学 信息安全工程学院,四川 成都 610225
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401-001);The National High Technology Research and Development Program of China (863 Program)(2012AA01A403);“The 12th Five-Years” National Cryptogram Development Fund(MMJJ201101022);Sichuan Science and Technology Support Programmer(2014GZ0148);Sichuan Provincial Education Department Key Scientific Research Projects(13Z A0091);The Scientific Research Foundation of CUIT(CRF201301)
Min WANG, Zhen WU, Jin-tao RAO, et al. Mutual information power analysis attack in the frequency domain of the crypto chip[J]. Journal on Communications, 2015, 36(Z1): 131-135.
DOI:
Min WANG, Zhen WU, Jin-tao RAO, et al. Mutual information power analysis attack in the frequency domain of the crypto chip[J]. Journal on Communications, 2015, 36(Z1): 131-135. DOI: 10.11959/j.issn.1000-436x.2015291.
Mutual information power analysis attack in the frequency domain of the crypto chip
Based on the mutual information power analysis attack in time domain of the crypto chip
a method for analyzing the energy of the maximum mutual information coefficient in the frequency domain was proposed.This method combined the principle of password chip information leakage in frequency domain and the principle of mutual information power analysis.The concept of maximum mutual information coefficient was introduced
which avoided the operation of accurate alignment in time domain.Experiments on the algorithm of SMS4 show that the effectiveness of the maximum mutual information coefficient attack in the frequency domain is extended to the method of the side channel energy analysis.
关键词
Keywords
references
KOCHER P , JAFFE J , JUN B . Differential power analysis [A ] . Crypto 1999 [C ] . Santa-Barbara,CA,USA , 1999 . 398 - 412 .
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model [A ] . Cryptographic Hardware Embedded SystemCHES 2004 Lec-ture Notes in Computer Science [C ] . 2004 . 16 - 29 .
CHARI S , RAO J , ROHATGI P . Template attacks.cryptographic hard-ware and embedded systems-ches [A ] . The 4th International Workshop,Redwood Shores [C ] . 2002 .
GIERLICHS B , BATINA L , TUYLS P , et al . Mutual information analysis [A ] . CHES 2008 [C ] . Washington DC,USA , 2008 .
VEYRAT-CHARVILLON N , STANDAERT F X . Mutual information analysis:how,when and why [A ] . Cryptographic Hardware and Embedded Sys-tems-CHES 2009 [C ] . Lecture Notes in Computer Science.Springer , 2009 .
GIERLICHS B , BATINA L , TUYLS P . Mutual information analysis a universal differential side-channel attack [J ] . Journal of Cryptology , 2010 , 24 ( 2 ): 269 - 291 .
MATEOS E , GEBOTYS C H . A new correlation frequency analysis of the side channel [A ] . Proceedings of the 5th Workshop on Embedded Systems Se-curity [C ] . ACM , 2010 .
LINGE Y , DUMAS C . LAMBERT-LACROIX S . Maximal Information Coefficient Analysis [R ] . Cryptology ePrint Archive:Report 2014/012 , 2014 .
SHEN W . Research of Power Attack and Defense on SM4 Algorithm [D ] . Xi’an:Xidian University , 2009 .
BATINA L , HOGENBOOM J , et al . Getting more from PCA:first results of using principal component analysis for extensive power analysis [A ] . Topics in Cryptology–CT-RSA 2012 [C ] . Springer Berlin Hei-delberg , 2012 . 383 - 397 .