首页> 外文会议>International Conference on Cryptology in India >Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis
【24h】

Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis

机译:通过选择的明文碰撞功率分析,完全恐慌AES样块密码

获取原文

摘要

Despite Kerckhoffs's principle, proprietary or otherwise secret cryptographic algorithms are still used in real life. For security and efficiency reasons a common design practice simply modifies some parameters of widely used and well studied encryption standards. In this paper, we investigate the feasibility of reverse engineering the secret specifications of an AES-like block cipher by SCARE techniques based on collision power analysis. In the considered observational model, we demonstrate that an adversary who does not know the secret key can recover the full set of secret parameters of an AES-like software implementation even if it is protected by common first-order Boolean masking and shuffling of independent operations. We study possible countermeasures and recall some simple guidelines to mitigate the side-channel information with the aim to thwart our attacks.
机译:尽管Kerckhoffs的原则,专有或以其他方式秘密加密算法仍然在现实生活中使用。出于安全性和效率原因,常见的设计实践只是修改了一些广泛使用的参数,并良好地研究了加密标准。在本文中,我们通过基于碰撞功率分析的恐慌技术来研究逆向工程AES样块密码的秘密规格的可行性。在考虑的观察模型中,我们证明了不知道秘密密钥的对手可以恢复AES样软件实现的全套秘密参数,即使它是由常见的一阶布尔屏蔽和破旧的独立操作的保护。我们研究可能对策,并记录一些简单的指导方针,以减轻侧通道信息,旨在挫败我们的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号