计算机工程 ›› 2020, Vol. 46 ›› Issue (1): 102-107,113.doi: 10.19678/j.issn.1000-3428.0053229

• 网络空间安全 • 上一篇    下一篇

针对分组密码的攻击方法研究

朱文锋1, 王琴1, 郭筝1,2, 刘军荣1,2   

  1. 1. 上海交通大学 微电子学院, 上海 200240;
    2. 智巡密码(上海)检测技术有限公司, 上海 201100
  • 收稿日期:2018-11-23 修回日期:2019-02-20 出版日期:2020-01-15 发布日期:2019-03-05
  • 作者简介:朱文锋(1994-),男,硕士研究生,主研方向为旁路攻击方法、硬件木马检测;王琴,副教授、博士;郭筝、刘军荣,博士。
  • 基金项目:
    国家自然科学基金"针对S芯片验证模块引脚信息的自动分析技术"(U1536103);上海市闵行区中小企业技术创新计划"基于区块链技术的金融业务平台"(2018MH110)。

Research on Attacks Method for Block Ciphers

ZHU Wenfeng1, WANG Qin1, GUO Zheng1,2, LIU Junrong1,2   

  1. 1. School of Microelectronics, Shanghai Jiao Tong University, Shanghai 200240, China;
    2. Zhixun Cipher(Shanghai) Detection Technology Co., Ltd., Shanghai 201100, China
  • Received:2018-11-23 Revised:2019-02-20 Online:2020-01-15 Published:2019-03-05

摘要: 为提升旁路攻击对分组密码算法硬件实现电路的攻击效果,增大正确密钥与错误密钥间的区分度,提出一种针对分组密码的旁路攻击方法。结合差分功耗分析(DPA)攻击和零值攻击的特点,通过分类来利用尽可能多的功耗分量,以攻击出全部密钥。在FPGA上实现AES硬件电路并进行实验,结果表明,在20万条全随机明文曲线中,该方法恢复出了全部密钥,相比DPA攻击方法,其正确密钥与错误密钥间的区分度更大。

关键词: 旁路攻击方法, 硬件实现, 分组密码算法, 组合逻辑功耗, 信噪比

Abstract: In order to improve the effect of Side Channel Attacks(SCAs) on the hardware implementation of block cipher algorithm,and increase the discrimination between correct keys and wrong keys,this paper proposes a SCAs method for block ciphers.This method combines the characteristics of Differential Power Analysis(DPA) attack and zero-value attack,and utilizes as many power components as possible through classification,thus obtaining all keys by attacking.Then,the AES hardware circuit is implemented on the FPGA and experiments are carried out.The results show that the proposed method successfully recovers all keys in 200,000 full random plaintext curves.Besides,the correct keys and wrong keys are more distinguishable in this method than those in the DPA attack method.

Key words: Side Channel Attacks(SCAs) method, hardware implementation, block cipher algorithm, combinational logic power, Signal to Noise Ratio(SNR)

中图分类号: