【24h】

Blind Differential Cryptanalysis for Enhanced Power Attacks

机译:盲差分密码分析可增强电源攻击

获取原文
获取原文并翻译 | 示例

摘要

At FSE 2003 and 2004, Akkar and Goubin presented several masking methods to protect iterated block ciphers such as DES against Differential Power Analysis and higher-order variations thereof. The underlying idea is to randomize the first few and last few rounds of the cipher with independent masks at each round until all intermediate values depend on a large number of secret key bits, thereby disabling power attacks on subsequent inner rounds. We show how to combine differential cryptanalysis applied to the first few rounds of the cipher with power attacks to extract the secret key from intermediate unmasked (unknown) values, even when these- already depend on all secret key bits. We thus invalidate the widely believed claim that it is sufficient to protect the outer rounds of an iterated block cipher against side-channel attacks.
机译:在2003年和2004年FSE上,Akkar和Goubin提出了几种屏蔽方法,以保护诸如DES之类的迭代分组密码免受差分功率分析及其高阶变化的影响。基本思想是在每一轮使用独立的掩码将密码的前几轮和最后几轮随机化,直到所有中间值都取决于大量秘密密钥位,从而在随后的内部轮次中禁用功耗攻击。我们展示了如何将应用于密码的前几轮的差分密码分析与功率攻击相结合,以从中间的未掩码(未知)值中提取密钥,即使这些值已经依赖于所有密钥。因此,我们使人们普遍认为的足以保护迭代分组密码的外部轮免受边信道攻击的主张无效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号