首页> 外文会议>International Workshop on Selected Areas in Cryptography >Blind Differential Cryptanalysis for Enhanced Power Attacks
【24h】

Blind Differential Cryptanalysis for Enhanced Power Attacks

机译:盲差分密码分析,用于增强的电力攻击

获取原文
获取外文期刊封面目录资料

摘要

At FSE 2003 and 2004, Akkar and Goubin presented several masking methods to protect iterated block ciphers such as DES against Differential Power Analysis and higher-order variations thereof. The underlying idea is to randomize the first few and last few rounds of the cipher with independent masks at each round until all intermediate values depend on a large number of secret key bits, thereby disabling power attacks on subsequent inner rounds. We show how to combine differential cryptanalysis applied to the first few rounds of the cipher with power attacks to extract the secret key from intermediate unmasked (unknown) values, even when these- already depend on all secret key bits. We thus invalidate the widely believed claim that it is sufficient to protect the outer rounds of an iterated block cipher against side-channel attacks.
机译:在FSE 2003和2004中,Akkar和Goubin提出了几种掩蔽方法,以保护迭代块密码,例如差分功率分析及其高阶变化。潜在的想法是在每轮中随机掩模随机掩模随机化,直到所有中间值取决于大量的秘密密钥位,从而禁用随后内部的电力攻击。我们展示了如何将应用于第一个几轮密码的差分密码分析使用电力攻击从中间解开(未知)值中提取秘密密钥,即使在这些 - 已经取决于所有密钥位。因此,我们毫无欣赏的宣称,它足以保护迭代块密码的外部轮次以防止侧信道攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号