【24h】

Improved Higher-Order Side-Channel Attacks with FPGA Experiments

机译:通过FPGA实验改善了高阶边通道攻击

获取原文
获取原文并翻译 | 示例

摘要

We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differential Power Analysis (DPA), we describe an improvement of the previously introduced higher-order techniques allowing us to defeat masked implementations in a low (i.e. practically tractable) number of measurements. The proposed technique is based on the efficient use of the statistical distributions of the power consumption in an actual design. It is confirmed both by theoretical predictions and practical experiments against FPGA devices.
机译:我们证明,屏蔽分组密码实现并不能充分提高其针对边信道攻击的安全性。在与差分功率分析(DPA)完全相同的假设下,我们描述了对先前引入的高阶技术的改进,使我们能够以少量(即,实际上易于处理)的测量结果击败掩盖的实现。所提出的技术基于在实际设计中有效利用功耗的统计分布。针对FPGA器件的理论预测和实际实验都证实了这一点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号