首页> 外文会议>International conference on cryptology in India >Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis
【24h】

Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis

机译:通过选择的明文碰撞能力分析完成AES类密码的完整SCARE

获取原文

摘要

Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely used and well studied encryption standards. In this paper, we investigate the feasibility of reverse engineering the secret specifications of an AES-like block cipher by SCARE techniques based on collision power analysis. In the considered observational model, we demonstrate that an adversary who does not know the secret key can recover the full set of secret parameters of an AES-like software implementation even if it is protected by common first-order Boolean masking and shuffling of independent operations. We study possible countermeasures and recall some simple guidelines to mitigate the side-channel information with the aim to thwart our attacks.
机译:尽管有Kerckhoffs的原理,但在现实生活中仍然使用专有或其他秘密的加密算法。出于安全和效率方面的考虑,常见的设计惯例只是修改了广泛使用且经过充分研究的加密标准的某些参数。在本文中,我们研究了基于碰撞功率分析通过SCARE技术对类似AES的分组密码的秘密规范进行反向工程的可行性。在考虑的观察模型中,我们证明了不知道秘密密钥的对手可以恢复类似于AES的软件实现的全部秘密参数集,即使它受到通用的一阶布尔掩码和独立操作的改组保护也是如此。 。我们研究了可能的对策,并回顾了一些简单的指南来减轻侧信道信息,从而阻止我们的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号