首页> 外文会议>Information Security and Privacy >Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces
【24h】

Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces

机译:Rijndael实现上的放大差分功率密码分析,功率迹线呈指数减少

获取原文

摘要

Recently, many research works have been conducted about how to carry out physical cryptanalysis on cryptographic devices by exploiting any possible leaked information through side channels. Research results were also reported on how to develop countermeasures against existing physical cryptanalysis. However, very little attention has been paid to deal with the possible mutual relationship between different kinds of physical cryptanalysis when designing a specific countermeasure. In this paper, it is pointed out that enhanced implementations of the Rijndael cipher (AES) against timing cryptanalysis and simple power cryptanalysis (SPA) may unfortunately become more vulnerable to the differential power cryptanalysis (DPA). Technically speaking, based on Sommer's work and experiments presented in CHES 2000, this new DPA on the above mentioned Rijndael implementations enables a much more significant observable peak within the differential power trace. This makes the DPA attack be more easier with fewer required power traces.
机译:近来,已经进行了许多有关如何通过利用通过副信道的任何可能的泄漏信息来对密码设备进行物理密码分析的研究工作。还报告了有关如何制定针对现有物理密码分析的对策的研究结果。但是,在设计特定对策时,很少关注处理不同种类的物理密码分析之间可能的相互关系。本文指出,针对时序密码分析和简单功率密码分析(SPA)的Rijndael密码(AES)的增强实现可能很容易受到差分功率密码分析(DPA)的攻击。从技术上讲,基于CHES 2000中Sommer的工作和实验,基于上述Rijndael实施方案的新DPA使得差分功率曲线内的可观察峰值更为显着。这使DPA攻击变得更容易,所需的电源走线也更少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号