【24h】

Entropy-based Power Attack

机译:基于熵的电力攻击

获取原文

摘要

Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, the MIA fails when applied on a DES crypto processor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.
机译:最近的作品表明,互信息是通用侧通道区段器,因为它检测到秘密泄漏观测和假设之间的任何类型的统计依赖性。在这项研究中,互信息分析(MIA)在嘈杂的现实世界设计中进行了测试。它确实似乎是打破未受保护的实现的强大方法。但是,MIA在应用于ROM中的屏蔽替换箱(Sboxes)的DES Crypto处理器上时失败。然而,这种掩蔽实现对高阶差分功率分析(HO-DPA)仍然敏感。例如,基于方差分析的攻击清楚地显示了一阶屏蔽对策的漏洞。我们提出了一种新的信息 - 理论对众议攻击方法,称为基于熵的权力分析(EPA)。这种新攻击对高度信息丰富的分区最重要的是,与此同时更好地区分关键假设。拟议攻击的彻底实证评估证实了与MIA相比这种新方法的压倒性优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号