首页> 外文会议>2012 5th International Congress on Image and Signal Processing. >A CPA attack against round based Piccolo-80 hardware implementation
【24h】

A CPA attack against round based Piccolo-80 hardware implementation

机译:针对基于回合的Piccolo-80硬件实现的CPA攻击

获取原文
获取原文并翻译 | 示例

摘要

In CHES 2011, Sony Corporation proposed a very promising ultra-lightweight blockcipher named Piccolo and claimed it offers a sufficient security level against known cryptanalyses based on mathematical weaknesses. The correlation power analysis (CPA) attack against a round-based Piccolo-80 hardware implementation is discussed in this paper. We built a power consumption acquisition platform based on simulation for minimum overhead, presented a feasible CPA attack method based on HD model and the final round, and retrieved the final round key RK24L, RK24R and the whiten key WK2 and WK2 with 500 power traces. The results showed Piccolo-80 round-based hardware implementation is vulnerable to power analysis attack. To the best of our knowledge, this is the first paper to discuss power analysis attack against Piccolo.
机译:在2011年CHES中,索尼公司提出了一种非常有前途的超轻量级加密算法,称为Piccolo,并声称它为基于数学弱点的已知密码分析提供了足够的安全级别。本文讨论了针对基于回合的Piccolo-80硬件实现的相关功率分析(CPA)攻击。我们建立了一个基于仿真的功耗采集平台,以最小的开销,提出了一种基于高清模型和最后一轮的可行的CPA攻击方法,并检索了最后一轮密钥RK 24 L ,RK 24 R 和具有500条电源迹线的白键WK 2 和WK 2 。结果表明,基于Piccolo-80轮的硬件实现很容易受到功耗分析攻击。据我们所知,这是第一篇讨论针对短笛的功率分析攻击的论文。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号