《计算机应用研究》|Application Research of Computers

基于密钥差异的改进相关性分析方法研究

Improved correlation power analysis based on difference variability

免费全文下载 (已被下载 次)  
获取PDF全文
作者 张晓宇,陈开颜,张阳,桂伟龙
机构 1.军械工程学院 信息工程系,石家庄 050003;2.中国卫星海上测控部实验技术部,江苏 江阴 214431
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2017)09-2791-04
DOI 10.3969/j.issn.1001-3695.2017.09.050
摘要 针对标准相关性能量分析(CPA)在旁路攻击中存在的运算时间长、搜索空间大等问题,在分析了功耗泄露信息与数据相关性的基础上,结合标准相关性分析方法,提出一种基于密钥差异位的改进相关性分析方法。该方法利用加密密钥同猜测密钥差异位与猜测密钥同实际能量消耗间的相关系数反比映射这一特征,在给定一个密钥假设的情况下,通过逐位改变0、1取值进行相关性计算获取正确密钥;在搭建实验平台上,针对AES首轮首字节加密实现对改进前后的相关性分析方法分别进行攻击实验。对比表明新方法在破解密钥的基础上成功将密钥搜索空间由原来28成功降至9。
关键词 密码芯片;高级加密标准;相关性能量分析;数据相关性;旁路信号
基金项目 国家自然科学基金资助项目(51377170)
河北省自然科学基金资助项目(F2012506008)
本文URL http://www.arocmag.com/article/01-2017-09-050.html
英文标题 Improved correlation power analysis based on difference variability
作者英文名 Zhang Xiaoyu, Chen Kaiyan, Zhang Yang, Gui Weilong
机构英文名 1.Dept.ofInformationEngineering,OrdnanceEngineeringCollege,Shijiazhuang050003,China;2.TechnologyDept.,SatelliteMarineTracking&ControlDept.ofChina,JiangyinJiangsu214431,China
英文摘要 Traditional correlation power analysis(CPA) had the problems of long analysis time and complexity computation. Combining the CPA, this paper proposed a method of correlation analysis based on difference variability, which used the diffe-rence between encryption key and hypothetical key. This method used the reciprocal relation between different bits and correlation relation. On the basis of given hypothesis key, it changed the value of every bit to obtain the correct key, which only needed 9 calculations to capture the 8 bit sub-key. Advanced encryption standard (AES) is cracked respectively in traditional CPA experiment and improved experiment. The result shows that the new method improves the efficiency on the basis of cracking the key successfully.
英文关键词 cipher chip; advanced encryption standard; correlation power analysis; data correlation; side-channel signal
参考文献 查看稿件参考文献
  [1] Bruneau N, Danger J, Guilley S, et al. Boosting higher-order correlation attacks by dimensionality reduction[C] //Security, Privacy, and Applied Cryptography Engineering. 2014:183-200.
[2] Durvaux F, Standaert F, Veyrat-Charvillon N, et al. Efficient selection of time samples for higher-order DPA with projection pursuits[C] //Proc of International Workshop on Constructive Side-Channel Analysis and Secure Design. 2015:34-50.
[3] 王红胜, 纪道刚, 高艳磊, 等. 基于时间相关单光子计数技术的密码芯片光辐射分析[J] . 物理学报, 2015, 64(5):058901-1-058901-7.
[4] Chong K S, Ne K Z L, Ho Wenggeng. Counteracting differential po-wer analysis[C] //Proc of IEEE International Conference on Electron Devices and Solid-State Circuits. 2015:297-300.
[5] Liu Junrong, Yu Yu, Standaert F X. Small tweaks do not help:differential power analysis of milenage implementation in 3G/4G USIM cards[C] //Proc of European Symposium on Research in Computer Security. [S. l. ] :Springer International Publishing, 2015:468-480.
[6] 王红胜. 针对AES密码芯片的光旁路攻击技术研究[D] . 石家庄:军械工程学院, 2015.
[7] 张阳, 陈开颜, 李雄伟, 等. 基于差异度的密码芯片旁路攻击研究[J] . 通信学报, 2015, 36(3):100-105.
[8] Mangard S, Oswald E , Popp T. 能量分析攻击[M] . 冯登国, 等译. 北京:科学出版社, 2010.
[9] Wang Ding, Wang Nan, Wang Ping, et al. Preserving privacy for free:efficient and provably secure two-factor authentication scheme with user anonymity[J] . Information Sciences, 2015, 321(11):162-178.
[10] 周国鑫, 尹慧琳. 面向AES密码芯片的DPA攻击技术研究[J] . 计算机与现代化, 2012(2):153-159.
[11] Mangard S, Oswald E, Popp T. Power analysis attacks:revealing the secrets of smart cards[M] //Advances in Information Security. Berlin:Springer, 2007.
[12] Kocher P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C] //Proc of the 16th Annual International Cryptology Conference on Advances in Cryptology. London:Springer-Verlag, 1996:104-113.
[13] Sauvage L, Guilley S, Mathieu Y. Elect romagnetic raditions of FPGAs:high spatial resolution cartography and attack of a cryptographic module[J] . ACM Trans on Reconfigurable Technology and Systems, 2009, 2(1):1-24.
收稿日期 2016/6/28
修回日期 2016/8/22
页码 2791-2794
中图分类号 TN918.4
文献标志码 A