Template attack of Crypto chip based on clustering
Artificial Intelligence and Network Security|更新时间:2024-06-05
|
Template attack of Crypto chip based on clustering
Journal on CommunicationsVol. 39, Issue 8, Pages: 83-93(2018)
作者机构:
成都信息工程大学网络空间安全学院,四川 成都 610225
作者简介:
基金信息:
The National Science and Technology Major Project(2014ZX01032401);The National High Technology Re-search and Development Program of China(863 Program)(2012AA01A40);The “13th Five-Years” National Cryptogram Development Fund(MMJJ20180244);Sichuan Province Science and Technology Program(2017GZ0313);Sichuan Provincial Education Department Scientific Research Projects(17ZB0082)
Zhen WU, Zhibo DU, Min WANG, et al. Template attack of Crypto chip based on clustering[J]. Journal on Communications, 2018, 39(8): 83-93.
DOI:
Zhen WU, Zhibo DU, Min WANG, et al. Template attack of Crypto chip based on clustering[J]. Journal on Communications, 2018, 39(8): 83-93. DOI: 10.11959/j.issn.1000-436x.2018130.
Template attack of Crypto chip based on clustering
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is only applied to the device that the key input can be controlled.In order to resolve the restrictive preconditions
a novel method of template attack based on clustering was proposed.The clustering EM algorithm was modified according to the characteristics of information leakage model in the method.The modified clustering methods accurately fitted the leaked information probability model in the case of unknown key
the location of information leakage could be determined.Then the attack established the templates in the location
and implemented template matching.The proposed method eliminates the dependence of traditional template attacks on per-conditions and expand the application scenario of template attack.
关键词
Keywords
references
KOCHER P C , . Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems [C ] // Annual International Cryptology Conference . 1996 : 104 - 113 .
KOCHER P , JAFFE J , JUN B . Differential power analysis [C ] // Annual International Cryptology Conference . 1999 : 388 - 397 .
BRIER E , CLAVIER C , OLIVIER F . Correlation power analysis with a leakage model [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2004 : 16 - 29 .
CHARI S , RAO J R , ROHATGI P . Template attacks [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2002 : 13 - 28 .
LERMAN L , MEDEIROS S F , VESHCHIKOV N , et al . Semisupervised template attack [C ] // International Workshop on Constructive Side-Channel Analysis and Secure Design . 2013 : 184 - 199 .
SCHINDLER W , LEMKE K , PAAR C . A stochastic model for differential side channel cryptanalysis [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2005 : 30 - 46 .
GIERLICHS B , LEMKE-RUST K , PAAR C . Templates vs.stochastic methods [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2006 : 15 - 29 .
KARSMAKERS P , GIERLICHS B , PELCKMANS K , et al . Side channel attacks on cryptographic devices as a classification problem [J ] . Esat Kuleuven Be , 2009 , 7 :36.
LERMAN L , POUSSIER R , BONTEMPI G , et al . machine learning revisited (and the curse of dimensionality in side-channel analysis) [C ] // International Workshop on Constructive Side-Channel Analysis and Secure Design . 2015 : 20 - 33 .
LERMAN L , BONTEMPI G , MARKOWITCH O . Side channel attack:an approach based on machine learning [J ] . Center for Advanced Security Research Darmstadt , 2011 : 29 - 41 .
BATINA L , GIERLICHS B , LEMKE-RUST K . Differential cluster analysis [M ] // Cryptographic Hardware and Embedded Systems-CHES . 2009 : 112 - 127 .
CHOU J W , CHU M H , TSAI Y L , et al . An unsupervised learning model to perform side channel attack [C ] // Pacific-Asia Conference on Knowledge Discovery and Data Mining . 2013 : 414 - 425 .
HEYSZL J , IBING A , MANGARD S , et al . Clustering algorithms for non-profiled single-Execution attacks on exponentiations [C ] // International Conference on Smart Card Research and Advanced Applications . 2013 : 79 - 93 .
LEMKE-RUST K , PAAR C . Gaussian mixture models for higher-order side channel analysis [C ] // International Workshop on Cryptographic Hardware and Embedded Systems . 2007 : 14 - 27 .
MANGARD S , OSWALD E , POPP T . Power analysis attacks:revealing the secrets of smart card [M ] . New York:Springer . 2007 .
STANDAERT F X , MALKIN T G , YUNG M . A unified framework for the analysis of side-channel key recovery attacks [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . 2009 : 443 - 461 .