首页> 外文会议>Cryptographic hardware and embedded systems-CHES 2009 >First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
【24h】

First-Order Side-Channel Attacks on the Permutation Tables Countermeasure

机译:排列表对策的一阶边通道攻击

获取原文
获取原文并翻译 | 示例

摘要

The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [5]. The counter-measure operates by ensuring that during the execution of an algorithm, each intermediate variable that is handled is in a permuted form described by the random permutation tables. In this paper, we examine the application of this countermeasure to the AES algorithm as described in [5], and show that certain operations admit first-order side-channel leakage. New side-channel attacks are developed to exploit these flaws, using correlation-based and mutual information-based methods. The attacks have been verified in simulation, and in practice on a smart card.
机译:Coron [5]最近提出使用随机置换表作为边信道攻击对策。该对策通过确保在算法执行期间操作的每个中间变量都采用随机排列表描述的排列形式来进行操作。在本文中,我们研究了此对策在[5]中描述的AES算法的应用,并表明某些操作允许一阶边信道泄漏。通过使用基于相关性和基于互信息的方法,开发了新的侧通道攻击来利用这些缺陷。这些攻击已通过仿真验证,并已在智能卡上进行了验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号