首页> 外文会议>International Conference on Cloud Computing and Security >Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion
【24h】

Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion

机译:针对AES密钥扩展的另一种针对随机顺序的SPA密钥恢复对策

获取原文

摘要

To increase the resistance against power analysis, random order countermeasure applied to AES key expansion was proposed and evaluated by Clavier et al. in CHES 2014. The proposed column-wise random order countermeasure showed certain resistance when the power consumption of the key expansion part is used for key recovery. For further evaluation, Clavier et al. analyzed the improvement of key recovery attack using fault injection as additional information. As for the acceleration of the key recovery, this work argues that extracting power information of AES state is more preferred than performing fault injections for practical attackers. This work comprehensively evaluates the random order countermeasure assuming the attackers use the power consumptions of AES state to accelerate the key recovery. We studied the relationship between key recovery result and the amount of information from AES state via both theoretical analysis and key recovery simulations. The results (a) demonstrate a set of effective key extractions with no fault injections and (b) discover the most cost-effective attack is extracting Hamming weight of 12 bytes for 2 AES executions, whose key extraction averagely finishes in 1 min.
机译:为了增加抵抗功率分析的能力,提出了应用于AES密钥扩展的随机顺序对策,并由Clavier等人进行了评估。在CHES 2014中提出。当密钥扩展部分的功耗用于密钥恢复时,建议的按列随机顺序对策显示出一定的阻力。为了进一步评估,Clavier等人。使用故障注入作为附加信息分析了密钥恢复攻击的改进。至于密钥恢复的加速,这项工作认为,对于实际的攻击者而言,提取AES状态的功率信息比执行故障注入更为可取。假设攻击者使用AES状态的功耗来加速密钥恢复,那么这项工作将综合评估随机顺序对策。我们通过理论分析和密钥恢复模拟研究了密钥恢复结果与AES状态信息量之间的关系。结果(a)展示了一组没有故障注入的有效密钥提取,并且(b)发现最具成本效益的攻击是为2个AES执行提取了12个字节的汉明权重,其密钥提取平均在1分钟内完成。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号