首页> 外文会议>2015 International Symposium on Advanced Computing and Communication >A heuristic approach to identify AES cryptosystem from the power traces
【24h】

A heuristic approach to identify AES cryptosystem from the power traces

机译:一种从功率迹线识别AES密码系统的启发式方法

获取原文
获取原文并翻译 | 示例

摘要

Power consumption of a device can be a major source of side channel information. This fact was brought forward by Kocher et. al. when they introduced the concept of power analysis attack. Although this kind of analysis is mainly used to break the security of a cryptosystem by finding the secret key, it can also give information to identify what kind of cryptosystem it is. The power traces which are extracted during such analysis are plotted against time and power consumed. These features can reveal the source of these traces if analyzed carefully. In this paper we try make analysis of AES power traces and find the features that may help us identify the source. 200 power traces were collected form an open source of which 100 traces were used for extracting their features and then this features were tested in other 100. Almost 67% of the testing traces were found to have similar features leading to identify the source of these traces.
机译:设备的功耗可能是辅助信道信息的主要来源。这个事实是由Kocher等人提出的。等当他们引入功率分析攻击的概念时。尽管这种分析主要用于通过找到秘密密钥来破坏密码系统的安全性,但它也可以提供信息以识别密码系统的类型。将在这种分析过程中提取的功率迹线与时间和功率消耗作图。如果仔细分析,这些功能可以揭示这些痕迹的来源。在本文中,我们尝试对AES功率迹线进行分析,并找到可以帮助我们识别信号源的功能。从开放源中收集了200条电源走线,其中100条走线用于提取其特征,然后在其他100条走线中进行了测试。发现将近67%的测试走线具有相似的特征,从而可以识别这些走线的来源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号