[1]何利文,国海轮,安 聪.基于人工智能的侧信道攻击研究[J].计算机技术与发展,2022,32(06):106-111.[doi:10. 3969 / j. issn. 1673-629X. 2022. 06. 018]
 HE Li-wen,GUO Hai-lun,AN Cong.Research on Side Channel Attack Based on Artificial Intelligence[J].,2022,32(06):106-111.[doi:10. 3969 / j. issn. 1673-629X. 2022. 06. 018]
点击复制

基于人工智能的侧信道攻击研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
32
期数:
2022年06期
页码:
106-111
栏目:
网络与安全
出版日期:
2022-06-10

文章信息/Info

Title:
Research on Side Channel Attack Based on Artificial Intelligence
文章编号:
1673-629X(2022)06-0106-06
作者:
何利文国海轮安 聪
南京邮电大学,江苏 南京 210000
Author(s):
HE Li-wenGUO Hai-lunAN Cong
Nanjing University of Posts and Telecommunications,Nanjing 210000,China
关键词:
侧信道攻击人工智能故障攻击功耗攻击模板攻击
Keywords:
side channel attackartificial intelligencefailure attackpower consumption attacktemplate attack
分类号:
TP31
DOI:
10. 3969 / j. issn. 1673-629X. 2022. 06. 018
摘要:
随着密码技术和信息技术的发展,目前的密码算法本身已足够强大,能够对抗传统的密码分析手段,但由于设备本身的工艺特性,其运行时会泄露如功耗、电磁、时间等侧信道信息,这些信息可以被攻击者利用,破解密钥。 因为这种攻击效果好,所以最开始比较受欢迎。 模板攻击由 Rohatgi 等人首次提出,和差分功耗攻击不同的是,它需要攻击者预先刻画密码芯片的模板,然后进行模板匹配,攻击时攻击者可以提取感兴趣的部分,因为监督学习和这种攻击过程很类似,所以机器学习在侧信道领域应用越来越广。 之后 Martinask 等人将深度学习方法引入模板攻击,结果表明攻击效果优于其他训练算法。 该文首先介绍了侧信道攻击的发展情况、概述、分类,之后结合最近几年机器学习技术的发展,阐述了人工智能在侧信道攻击技术方面的应用。
Abstract:
With the development of cryptography and information technology,the current cryptographic algorithm itself is strong enoughto fight against the traditional cryptanalysis methods. However, due to the process characteristics of the device itself, it will leak sidechannel information such as power consumption, electromagnetic,time and so on,which can be used by attackers to crack the key. Inmany side channel information,the acquisition of power consumption information  is relatively simple and low cost,but it has a strongattack effect. The template attack was first proposed by Rohatgi et al. Different from the differential power attack,it requires the attackerto characterize the template of the cryptographic chip in advance,and then match the template to the attacking device. During the attack,the attacker can extract the interested part,because the attack process of the template attack is similar to supervised learning,so manymachine learning algorithms are introduced into the field of side channel attack. After that, Martinask and others introduced the deeplearning method into the template attack,and the results show that the attack effect is better than other training algorithms. In this study,we first introduce the development, overview and classification of side channel attack, and then combined with the development ofmachine learning technology in recent years,expound the application of artificial intelligence in side channel attack technology.

相似文献/References:

[1]张春飞 李万龙 郑山红.Agent技术在智能教学系统中的应用与研究[J].计算机技术与发展,2009,(05):30.
 ZHANG Chun-fei,LI Wan-long,ZHENG Shan-hong.Application and Research of Agent Technology in Intelligent Tutoring System[J].,2009,(06):30.
[2]黄长专 王彪 杨忠.图像分割方法研究[J].计算机技术与发展,2009,(06):76.
 HUANG Chang-zhuan,WANG Biao,YANG Zhong.A Study on Image Segmentation Techniques[J].,2009,(06):76.
[3]张春飞 郑山红 李万龙.基于Agent技术的医疗信息整合研究[J].计算机技术与发展,2009,(10):250.
 ZHANG Chun-fei,ZHENG Shan-hong,LI Wan-long.Research on Integration of Healthcare Enterprise Based on Agent Technology[J].,2009,(06):250.
[4]王燕飞 金瓯 贺建飚.嵌入式系统的安全技术研究[J].计算机技术与发展,2008,(08):152.
 WANG Yan-fei,JIN Ou,HE Jian-biao.Study of Technology of Security in Embedded System[J].,2008,(06):152.
[5]杜秀全 程家兴.博弈算法在黑白棋中的应用[J].计算机技术与发展,2007,(01):216.
 DU Xiu-quan,CHENG Jia-xing.Game- Playing Algorithm in Black and White Chess Application[J].,2007,(06):216.
[6]孙锦 冯勤超.创造力支持系统[J].计算机技术与发展,2007,(03):138.
 SUN Jin,FENG Qin-chao.Creativity Support System[J].,2007,(06):138.
[7]吉张媛 何华灿.模糊Prolog系统[J].计算机技术与发展,2006,(02):123.
 JI Zhang-yuan,HE Hua-can.Fuzzy Prolog System[J].,2006,(06):123.
[8]丁莹.研究人工智能的一条新途径[J].计算机技术与发展,2012,(03):133.
 DING Ying.A New Avenue of Researching on AI[J].,2012,(06):133.
[9]张代远[].一类新型改进的广义蚁群优化算法[J].计算机技术与发展,2012,(06):39.
 ZHANG Dai-yuan.A New Improved Generalized Ant Colony Optimization Algorithm[J].,2012,(06):39.
[10]于尚超 李阳 王鹏.基于拼凑替换的定理机器证明的研究与实现[J].计算机技术与发展,2012,(06):135.
 YU Shang-chao,LI Yang,WANG Peng.Research and Realization of Theorem Proving Based on Combination and Replace[J].,2012,(06):135.

更新日期/Last Update: 2022-06-10