首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
【24h】

Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer

机译:多目标DPA攻击:推动DPA超出桌面计算机的极限

获取原文

摘要

Following the pioneering CRYPTO '99 paper by Kocher et al., differential power analysis (DPA) was initially geared around low-cost computations performed using standard desktop equipment with minimal reliance on device-specific assumptions. In subsequent years, the scope was broadened by, e.g., making explicit use of (approximate) power models. An important practical incentive of so-doing is to reduce the data complexity of attacks, usually at the cost of increased computational complexity. It is this trade-off which we seek to explore in this paper. We draw together emerging ideas from several strands of the literature - high performance computing, post-side-channel global key enumeration, and effective combination of separate information sources - by way of advancing (non-profiled) 'standard DPA' towards a more realistic threat model in which trace acquisitions are scarce but adversaries are well resourced. Using our specially designed computing platform (including our parallel and scalable DPA implementation, which allows us to work efficiently with as many as 2~(32) key hypotheses), we demonstrate some dramatic improvements that are possible for 'standard DPA' when combining DPA outcomes for several intermediate targets. Unlike most previous 'information combining' attempts, we are able to evidence the fact that the improvements apply even when the exact trace locations of the relevant information (i.e. the 'interesting points') are not known a priori but must be searched simultaneously with the correct subkey.
机译:通过Kocher等人的先驱加密'99纸张,差分功率分析(DPA)最初围绕使用标准桌面设备执行的低成本计算,其依赖于设备特定的假设。在随后的几年中,范围是扩大的,例如,明确使用(近似)电力模型。如此的重要实际激励是为了降低攻击的数据复杂性,通常以增加的计算复杂性的成本。这是我们寻求探索本文的权衡。我们从文学的几个股线上汇集了新兴思路 - 高性能计算,后侧通道全球重点枚举,并有效地结合了单独的信息来源 - 通过推进(非分布)'标准DPA'走向更现实的方式追踪采集的威胁模型是稀缺,但对手进行了很好的资源。使用我们专门设计的计算平台(包括我们并行和可扩展的DPA实现,这使我们能够高效地工作,多达2〜(32)密钥假设),我们展示了在组合DPA时“标准DPA”可能的一些戏剧性改进几个中间目标的结果。与大多数以前的“相结合”尝试不同,我们能够证明即使相关信息的确切迹线位置(即“有趣点”)未知先验,即使必须同时搜索正确的子。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号