Abstract:To resolve the problem with selecting the samples in the Differential Power Attack (DPA), this paper proposed a set of samples selection method. Based on the given experimental platform, the mode and amount of samples selection were proposed through theoretical analysis, and then were validated by experiments. For Advanced Encryption Standard (AES), this paper put forward the samples selection methods for simulation test and practical experimentation, and proved that the proposed method was right. The results show that the simulation sample plaintext attack should be taken in sequence, with the quantity of a full array. And the attack should be measured directly using a large number of random numbers. There is a big difference in the explicit requirements of the sample.
KOCHER P, JAFFE J, JUN B. Differential power analysis [C]// Advances in Cryptology-CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999: 388-397.
[2]
STANDAERT F-X, MALKIN T G, YUNG M. A unified framework for the analysis of side-channel key recovery attacks [C]// EUROCRYPT'09: Proceedings of the 28th Annual International Conference on Advances in Cryptology: The Theory and Applications of Cryptographic Techniques, LNCS 5479. Berlin: Springer-Verlag, 2009: 443-461.
[3]
REN FANG, YAN YINGJIAN, FU XIAOBING. Design of differential power analysis resistant crypto chip based on time randomization [J]. Journal of Electronics (CHINA), 2010, 27(2): 237-242.
GUILLEY S, HOOGVORST P, PACALET R. Differential power analysis model and some results [C]// Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications. Norwell: Kluwer Academic Publishers, 2004: 127-142.
[7]
MANGARD S, OSWALD E, POPP T.能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
[8]
LE T H, CLEDIERE J, SERVIERE C, et al. Noise reduction in side channel attack using fourth-order cumulant [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(4): 710-720.
[9]
PARK J, LEE H, HA J, et al. A differential power analysis attack of block cipher based on the Hamming weight of internal operation unit [C]// Proceedings of 2006 International Conference on Computational Intelligence and Security, LNCS 4456. Berlin: Springer-Verlag, 2006: 1375-1380.
MESSERGES T S, DABBISH E A, SLOAN R H. Examining smart-card security under the threat of power analysis attacks [J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.
[12]
STRACHACKI M, SZCZEPANSKI S. Implementation of AES algorithm resistant to differential power analysis [C]// ICECS 2008: Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems. Piscataway: IEEE, 2008: 214-217.