全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

侧信道分析中高阶掩码组合函数优化方案

Keywords: 侧信道分析,掩码防护,泄露模型,组合函数

Full-Text   Cite this paper   Add to My Lib

Abstract:

功耗掩码是一种抗侧信道攻击的防护方案,是现有最有效的算法级防护方案之一.针对掩码的分析方法主要包括相关性功耗分析CPA与互信息分析MIA,两种分析方法中的关键问题均为泄露模型与组合函数.本文对掩码方案的功耗泄漏与TC(toggle count)泄露模型进行研究,提出了MTC(multicycle toggle count)模型.MTC模型与现有TC模型相比,可对多个周期的功耗泄漏进行刻画,与TC模型相比准确性提高了15.4%.根据MTC模型现有的组合函数进行研究.提出了一种组合函数优化方案.实验结果显示,针对掩码电路使用该组合函数优化方案后,CPA的有效性可提高32.3%,MIA的有效性可提高22.2%

References

[1]  KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Advances in Cryptology—CRYPTO'99(LNCS 1666).Heidelberg:Springer,1999:789-789.DOI:10.1007/3-540-48405-1_25.
[2]  CHARI S,RAO J,ROHATGI P.Template attacks[C]//International Workshop on Cryptographic Hardware and Embedded Systems(LNCS 2523).Heidelberg:Springer,2003:51-62.DOI:10.1007/3-540-36400-5_3.
[3]  BRIER E,CLAVIER C,OLIVIER F.Correlation power analysis with a leakage model[C]//International Workshop on Cry ptogra ph ic Hardware and Embedded Systems(LNCS 3156).Heidelberg:Springer,2004:16-29.DOI:10.1007/978-3-540-28632-5_2.
[4]  GIERLICHS B,BATINA L,TUYLS P,et al.Mutual information analysis[C]//International Workshop on Cryptographic Hardware and Embedded Systems(LNCS 5154).Heidelberg:Springer,2008:426-442.DOI:10.1007/978-3-540-85053-3_27.
[5]  MANGARD S,POPP T,GAMMEL B M.Side-channel leakage of masked CMOS gates[C]//Cryptographers'Track at the RSA Conference(LNCS 3376).Heidelberg:Springer,2005,3376:351-365.DOI:10.1007/978-3-540-30574-3_24.
[6]  MANGARD S,PRAMSTALLER N,OSWALD E.Successfully attacking masked AES hardware implementations[C]//International Workshop on Cryptographic Hardware and Embedded Systems(LNCS3659).Heidelberg:Springer,2005:157-171.DOI:10.1007/11545262_12.
[7]  MORADI A,MISCHKE O.On the simplicity of converting leakages from multivariate to univariate[C]//International Workshop on Cryptographic Hardware and Embedded Systems(LNCS 8086).Heidelberg:Springer,2013:1-20.DOI:10.1007/978-3-642-40349-1_1.
[8]  PROUFF E,RIVAIN M,BEVAN R.Statistical analysis of second order differential power analysis[J].IEEE Transactions on Computers,2009,58(6):799-811.DOI:10.1109/TC.2009.15.
[9]  MANGARD S,OSWALD E,POPP T.Power Analysis Attacks:Revealing the Secrets of Smart Cards[M].Berlin:Springer Science&Business Media,2008:31-35.
[10]  GIERLICHS B,BATINA L,PRENEEL B,et al.Revisiting higher-order DPA attacks:Multivariate mutual information analysis[C]//Cryptographers'Track at the RSA Conference(LNCS 5985).Heidelberg:Springer,2010:221-234.DOI:10.1007/978-3-642-11925-5_16.
[11]  AKKAR M L,GIRAUD C.An implementation of DES and AES,secure against some attacks[C]//International Workshop on Cryptographic Hardware and Embedded Systems(LNCS 2162).Heidelberg:Springer,2001:309-318.DOI:10.1007/3-540-44709-1_26.
[12]  ROCHE T,PROUFF E.Higher-order glitch free implementation of the AES using secure multi-party computation protocols[J].Journal of Cryptographic Engineering,2012,2(2):111-127.DOI:10.1007/s13389-012-0033-3.
[13]  TANG M,GUO Z P,HEUSER A,et al PFD-A flexible higher-order masking scheme[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2017,36(8):1327-1339.DOI:10.1109/TCAD.2016.2629441.
[14]  ISHAI Y,SAHAI A,WAGNER D.Private circuits:Securing hardware against probing attacks[C]//Annual International Cryptology Conference(LNCS2729).Heidelberg:Springer,2003:463-481.DOI:10.1007/978-3-540-45146-4_27.
[15]  MORADI A,SALMASIZADEH M,SHALMANI M T M,et al.Vulnerability modeling of cryptographic hardware to power analysis attacks[J].Integration,the VLSI Journal,2009,42(4):468-478.DOI:10.1016/j.vlsi.2009.01.001.
[16]  AIST.Side-channel attack standard evaluation board(sasebo),SASEBO-R/-G/-GII[EB/OL].[2017-06-05].http://www.risec.aist.go.jp/project/sasebo/.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133