期刊文献+

对加掩加密算法的盲掩码模板攻击 被引量:3

Blind mask template attacks on masked cryptographic algorithm
在线阅读 下载PDF
导出
摘要 加掩是在加密算法的实现中使用随机掩码使敏感信息的泄露能耗随机化,从而防止差分能量攻击的技术手段。目前,对加掩防护加密算法的模板攻击的方法均要求攻击者在学习阶段了解使用的掩码。这一要求不仅提高了攻击的条件,同时也可能导致模板学习阶段使用的加密代码与实际设备的代码有所不同,进而导致对实际设备攻击效果较差。盲掩码模板攻击不需要了解训练能迹使用的掩码,直接学习无掩中间组合值的模板,以此攻击加掩加密设备。实验中分别采用传统的高斯分布和神经网络建立模板。实验结果证明这种方法是可行的,而且基于神经网络的盲掩码模板攻击对加掩加密设备的攻击成功率非常接近于传统模板攻击对无掩加密设备的攻击成功率。 Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information. Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase. This requirement not only increase the prerequisite of template attacking, but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices, which might degrade performance in real world attacking. Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces, and then uses these templates to attack masked cryptographic devices. Both traditional Gaussian distribution and neural network were adopted as the templates in experiments. Experimental results verified the feasibility of this new approach. The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.
作者 王燚 吴震 蔺冰 WANG Yi;WU Zhen;LIN Bing(College of Information Security Engineering, Chengdu University of Information Technology, Chengdu 610225, China)
出处 《通信学报》 EI CSCD 北大核心 2019年第1期1-14,共14页 Journal on Communications
基金 "十三五"国家密码发展基金资助项目(No.MMJJ20180224) 国家重点研发计划基金资助项目(No.2018YFB0904900 No.2018YFB0904901) 四川省教育厅科研基金资助项目(No.17ZB0082)~~
关键词 侧信道攻击 模板攻击 盲掩码攻击 加掩防护 神经网络 side channel attack template attack blind mask template attack masking countermeasure neural network
  • 相关文献

参考文献9

二级参考文献52

  • 1国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 2PAUL K, JOSHUA J, BENJAMIN J. Differential power analysis[A]. Proceedings of the 19th Annual International Cryptology Conferenee on Advances in Cryptology[C]. 1999. 388- 397.
  • 3ERIC B, CHRISTOPHE C, FRANCIS O. Correlation power analysis with a leakage model[A]. Proceeding of 6th International Workshop Cambridge[C]. M_A, USA, 2004.16-29.
  • 4CHEN A D, XU S, CHEN Y, et al, CoUision-based chosen-message simple power clustering attack algorithm[J]. China Communications, 2013,10(5):114-119.
  • 5BAI X F, XU Y H, GUO L. Securing SMS4 cipher against differential power analysis and its VLSI implementation[A]. Proceedings of llth IEEE International Conference on Communication Systems[C]. 2008. 167-172.
  • 6WANG S T, GU D W, LIU J R, et al. A power analysis on SMS4 using the chosen plaintext method[A]. 2013 Ninth International Conference on Computational Intelligence and Security[C]. Springer, 2013.748-752.
  • 7SURESH C, JOSYULA R R, PANK-J R. Template attacks[A]. Pro- ceedings of 4th International Workshop Redwood Shores[C]. CA, USA, 2003;13-28.
  • 8BRIER E, CLAVIER C, OLMER F. Correlation power analysis with a leakage module[A]. Proc.ecdings of 6th International Workshop Cambridge[C]. MA, USA, 2004. 125-134.
  • 9Chari S,Rao J R,Rohatgi P.Template attacks[C] //Proc of the 4th Workshop on Cryptographic Hardware and Embedded Systems.2002:13-28.
  • 10Mangard S,Oswald E,Popp T.Power analysis attacks:revealing the secrets of smart cards[M].New York:Springer-Verlag,2007.

共引文献37

同被引文献11

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部