Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering

Previous Articles     Next Articles

Correlation Power Analysis Attack in Frequency Domain for an AES Mask Algorithm

XIANG Chunling,WU Zhen,RAO Jintao,WANG Min,DU Zhibo   

  1. (College of Information Security Engineering,Chengdu University of Information Technology,Chengdu 610225,China)
  • Received:2015-09-25 Online:2016-10-15 Published:2016-10-15

针对一种AES掩码算法的频域相关性能量分析攻击

向春玲,吴震,饶金涛,王敏,杜之波   

  1. (成都信息工程大学 信息安全工程学院,成都 610225)
  • 作者简介:向春玲(1990—),女,硕士研究生,主研方向为信息安全、侧信道攻击与防御;吴震,副教授、硕士;饶金涛,硕士;王敏,博士研究生;杜之波,硕士。
  • 基金资助:
    国家“863”计划基金资助项目(2012AA01A403);国家科技重大专项基金资助项目(2014ZX01032401-001);“十二五”国家密码发展基金资助项目(MMJJ201101022);四川省科技支撑计划基金资助项目(2014GZ0148)。

Abstract: For the information leakage problem in the first-order mask encryption operation of vertically-reused mask in Advanced Encryption Standard(AES),this paper proposes an attack method based on power spectrum of second-order Correlation Power Analysis(CPA) in frequency domain.With the soft realization of AES first-order mask encryption algorithm in smartcard as the research object,the paper analyzes the weak points of the algorithm and conducts experiments,in order to get a more efficient high-order attack method.This paper compares the second-order CPA experiment in time domain with the one in frequency domain.The result shows that the second-order attack in frequency domain presents a better alignment effect,and has more obvious advantages in data processing complexity,data storage space,and attacks than in time domain.Furthermore,this attack method is applicable to other first-order mask cryptographic algorithms.

Key words: Side-channel Attack(SCA), vertically-reused Advanced Encryption Standard(AES), power spectrum, second-order Correlation Power Analysis(CPA), frequency domain attack

摘要: 针对纵向重用型高级加密标准(AES)一阶掩码加密运算过程中的侧信道信息泄露问题,提出一种基于功率谱的频域二阶相关性能量分析攻击方法。以智能卡上软实现的AES一阶掩码加密算法为研究对象,对其脆弱点进行分析并加以实验,研究更高效的高阶能量分析攻击方法。侧信道二阶时域攻击和二阶频域攻击实验的对比结果表明,基于功率谱的二阶频域攻击曲线对齐效果更好,数据处理时间复杂度和数据存储空间具有明显优势,攻击更高效,且此攻击方法适用于一阶掩码密码算法的攻击。

关键词: 侧信道攻击, 纵向重用型高级加密标准, 功率谱, 二阶相关性能量分析, 频域攻击

CLC Number: