计算机应用 ›› 2014, Vol. 34 ›› Issue (5): 1283-1287.DOI: 10.11772/j.issn.1001-9081.2014.05.1283

• 计算机安全 • 上一篇    下一篇

内置确定性子密钥相关系数功耗分析

李金良1,郁昱1,2,付荣2,李祥学1   

  1. 1. 华东师范大学 计算机科学与技术系,上海 200241
    2. 清华大学 交叉信息研究院,北京 100084
  • 收稿日期:2013-11-14 修回日期:2013-12-31 出版日期:2014-05-01 发布日期:2014-05-30
  • 通讯作者: 郁昱
  • 作者简介:李金良(1986-),女,湖北荆门人,硕士研究生,主要研究方向:信息安全;
    郁昱(1981-),男,江苏张家港人,助教,博士,主要研究方向:信息安全、密码学;
    付荣(1989-),男,贵州六盘水,硕士研究生,主要研究方向:信息安全;
    李祥学(1974-),男,上海人,副教授,博士,主要研究方向:信息安全、密码学、编码学。
  • 基金资助:

    实用抗泄漏密码学算法研究

Built-in determined sub-key correlation power analysis

LI Jinliang1,YU Yu1,2,FU Rong2,LI Xiangxue1   

  1. 1. Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China;
    2. Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084, China
  • Received:2013-11-14 Revised:2013-12-31 Online:2014-05-01 Published:2014-05-30
  • Contact: YU Yu

摘要:

针对Komano等(KOMANO Y, SHIMIZU H, KAWAMURA S. BS-CPA: built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010,E93-A(9):1632-1638.)对dpacontest.org平台提供的数据进行研究后提出的内置确定性子密钥相关系数功耗分析(BS-CPA)方法进行分析,并从破解所需功耗数据和成功率方面将BS-CPA与差分功耗分析(DPA)、相关系数功耗分析(CPA)进行比较分析,发现BS-CPA虽然理论上方法可行,但远未达到其声称的效果,进而从密码设备加密过程中寄存器状态的变化与功耗值的关系来选取中间变量,通过去除噪声和错误峰值,找到与密钥最相关数据点来缩小攻击范围。对于相同数量功耗数据,部分点攻击与全部点攻击相比,完全破解64位密钥的成功率最大可以提高60%。实验结果表明改进后的模型攻击效率得到提升,达到同样成功率需要功耗数据少,攻击结果稳定。

Abstract:

To study the Built-in determined Sub-key Correlation Power Analysis (BS-CPA) proposed by Yuichi Komano et al.(KOMANO Y, SHIMIZU H, KAWAMURA S. BS-CPA: built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010,E93-A(9):1632-1638.) based on the data set of dpacontest.org, this paper compared the efficiency of Differential Power Analysis (DPA), Correlation Power Analysis (CPA) and BS-CPA from the number of power consumption trace and success rate, the result shows that although BS-CPA works out nicely in theory, it is far from the reaching of the efficiency claimed by the authors, and then the intermediate was chosen by the relationship between the statement of executed cryptographic device’s register and power consumption. Attack surface was narrowed by the reduction of noise and ghost peak, the most relative point was filtered out. Compared with the whole point attack, the biggest success rate of partial point attack can be increased by 60% to crack the 64 bit keys for the same number traces. The experiment results prove that the improved model is able to increase the efficiency and decrease the needed power consumption trace for the same success rate, and the result is stable.

中图分类号: