【24h】

Ways to Enhance Differential Power Analysis

机译:提高差分功率分析的方法

获取原文

摘要

In [1] P. Kocher et al. introduced Differential Power Analysis (DPA), a statistical test (the difference of means) to retrieve secret keys from smart cards power consumption. For the correct hypothesis on the key, the difference of means is significantly different from zero. Hence a large peak is observed in the trace of the difference of means for the correct hypothesis. In the first part of this paper we explain why even with an arbitrarily large number of experiments, the difference of means is not always null for incorrect hypotheses on the key. We show further that peaks observed in the traces of the difference of means for incorrect hypotheses are inherent to the attacked algorithm and that this knowledge can be used to enhance power analysis attacks. Finally we propose another test that under some conditions efficiently detects the correct hypothesis even if incorrect hypotheses show larger peaks on the curves representing the difference of means. The combination of these methods can reduce the number of messages necessary to retrieve a key from a device by a factor greater than 2.
机译:在[1] kocher等人。引入差分功率分析(DPA),统计测试(手段的差异)从智能卡功耗中检索秘密键。对于钥匙上的正确假设,手段的差异与零显着不同。因此,在正确假设的装置的差异中观察到大峰值。在本文的第一部分中,我们解释为什么即使使用任意大量的实验,手段的差异并不总是为密钥上的错误假设而无效。我们进一步展示在错误假设的手段的差异差异中观察到的峰是攻击算法所固有的,并且该知识可用于增强功率分析攻击。最后,我们提出了另一个测试,即使错误的假设显示出代表手段差异的曲线上的曲线上显示出较大的峰值,也会有效地检测正确的假设。这些方法的组合可以减少从设备检索键的消息的数量大于2。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号