[1]何利文,国海轮,安 聪.AES 高阶掩码方案抗功耗攻击[J].计算机技术与发展,2022,32(05):68-74.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 012]
 HE Li-wen,GUO Hai-lun,AN Cong.Anti Power Attack of AES High-order Mask Scheme[J].,2022,32(05):68-74.[doi:10. 3969 / j. issn. 1673-629X. 2022. 05. 012]
点击复制

AES 高阶掩码方案抗功耗攻击()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年05期
页码:
68-74
栏目:
网络与安全
出版日期:
2022-05-10

文章信息/Info

Title:
Anti Power Attack of AES High-order Mask Scheme
文章编号:
1673-629X(2022)05-0068-07
作者:
何利文国海轮安 聪
南京邮电大学,江苏 南京 210003
Author(s):
HE Li-wenGUO Hai-lunAN Cong
Nanjing University of Posts and Telecommunications,Nanjing 210003,China
关键词:
AES 加密侧信道攻击CPA高阶掩码功耗攻击
Keywords:
AES encryptionside channel attackCPAhigh-order maskpower consumption attack
分类号:
TP31
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 05. 012
摘要:
随着密码技术和信息技术的发展,目前的密码算法本身已足够强大,能够对抗传统的密码分析手段,但由于设备本身的工艺特性,其运行时会泄露如功耗、电磁、时间等信息,这些信息能够被攻击者利用从而破解密钥,该方法称为侧信道攻击。 AES 加密算法容易受到侧信道攻击,为了解决该问题,通常通过添加一个或几个随机值即掩码。 当设计 d 阶时每个值都用到掩码,执行 SCA 的复杂度呈指数增长,因此设计 d 阶为安全参数的掩码方案对密码实现的物理安全性有重要意义。 根据 AES 常用的功耗攻击技术,提出了一种 d 阶掩码方案,此方案是基于 Ishai 等人在 Crypto 发表的面向硬件的掩码方案。 与此方案相比,所设计的方案可以在处理器上有效的实现。 实验结果表明,该方案降低了理论功耗和实践功耗之间的相关性,很好地保护了中间值不被泄露,提高了 AES 加密算法的抗功耗攻击能力。
Abstract:
Along with the development of the password technology and information technology,the current password algorithm itself is strong enough to against the traditional means of password analysis,but due to the technological characteristics of the device itself,its run time leaked information, such as power consumption,electromagnetic,time,which can be used to break key attackers. This method is called the side channel attacks. AES algorithm is vulnerable to side channel attack. In order to solve this problem,one or more random values are added,namely masks. Masks are used for each value when d-order is designed,and the complexity of SCA execution increases exponentially. Therefore,it is of great significance? to design a mask scheme with d-order as a security parameter for the physical security of cryptographic implementation. We propose a d-order mask scheme based on the hardware-oriented mask scheme published by Ishai etal. in Crypto,based on the commonly used power attack technology of AES. Compared with this scheme,the proposed scheme can be effectively implemented on the processor. The experimental results show that the proposed scheme reduces the correlation between theoretical power consumption and practical power consumption,protects the intermediate value from leakage, and improves the anti -power attack ability of AES encryption algorithm.

相似文献/References:

[1]王燕飞 金瓯 贺建飚.嵌入式系统的安全技术研究[J].计算机技术与发展,2008,(08):152.
 WANG Yan-fei,JIN Ou,HE Jian-biao.Study of Technology of Security in Embedded System[J].,2008,(05):152.
[2]张亚娟,韩银雪,刘效洋.基于 AES 算法的账号密码管理 APP[J].计算机技术与发展,2019,29(08):125.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 024]
 ZHANG Ya-juan,HAN Yin-xue,LIU Xiao-yang.Account Password APP Based on AES Algorithm[J].,2019,29(05):125.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 024]
[3]何利文,国海轮,安 聪.基于人工智能的侧信道攻击研究[J].计算机技术与发展,2022,32(06):106.[doi:10. 3969 / j. issn. 1673-629X. 2022. 06. 018]
 HE Li-wen,GUO Hai-lun,AN Cong.Research on Side Channel Attack Based on Artificial Intelligence[J].,2022,32(05):106.[doi:10. 3969 / j. issn. 1673-629X. 2022. 06. 018]

更新日期/Last Update: 2022-05-10