作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

一种带掩码AES算法的高阶差分功耗分析攻击方案

段晓毅,王思翔,崔琦,孙渴望   

  1. (北京电子科技学院 电子信息工程系,北京 100070)
  • 收稿日期:2016-08-18 出版日期:2017-10-15 发布日期:2017-10-15
  • 作者简介:段晓毅(1979—),男,讲师、博士,主研方向为密码学、计算机检测技术;王思翔、崔琦、孙渴望,硕士研究生。
  • 基金资助:

    北京市自然科学基金(4163076,4152048);北京电子科技学院基金(328201505,328201508)。

A High-order Differential Power Analysis Attack Scheme with Masked AES Algorithm

DUAN Xiaoyi,WANG Sixiang,CUI Qi,SUN Kewang   

  1. (Department of Electronics and Information Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
  • Received:2016-08-18 Online:2017-10-15 Published:2017-10-15

摘要:

鉴于能量分析攻击对密码芯片安全性的严重威胁,对掩码技术进行研究,提出一种通过使用预处理函数对固定值掩码进行攻击的高阶差分功耗分析(HODPA)方案。利用功耗曲线上2个信息点的联合分布绕过掩码对加密系统的保护。开发以MEGA16单片机为核心的侧信道攻击平台,并在该平台上进行实验验证,结果表明,在不明确掩码具体数值的情况下,一阶DPA无法恢复出正确密钥,HODPA方案仅需约500条功耗曲线即可得到正确密钥,且正误密钥之间区分度高,具有较强的实用性。

关键词: 掩码技术, 预处理函数, 差分功耗分析, 功耗曲线, AES算法

Abstract:

In view of the serious threats that power analysis attacks causes on the security of the cipher chip,based on the in-depth study of masked technology,this paper proposes a High Order Differential Power Analysis(HODPA) scheme which attacks the fixed value mask through the use of preprocessing function.By using the joint distribution of the two points on the power curve,this method successfully bypasses the mask’s protection of the system.It develops a side channel attack platform based on MEGA16 and carries out the experimental verification.Experimental result shows that,without knowing the specific masked value,the ordinary first order DPA cannot recover the correct key,but HODPA only needs about 500 power curves to get the correct key,and discrimination between correct key and wrong keys is high,fully proves the validity and practicability of the scheme.

Key words: masked technology, preprocessing function, Differential Power Analysis(DPA), power curve, AES algorithm

中图分类号: