首页> 外文会议>International Conference on Informatics, Electronics amp;amp;amp; Vision >Timing SCA against HMAC to investigate from the execution time of algorithm viewpoint
【24h】

Timing SCA against HMAC to investigate from the execution time of algorithm viewpoint

机译:时序SCA对HMAC进行调查算法的执行时间

获取原文

摘要

Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. There are a variety of security attacks on the PMU communications infrastructure. Timing Side Channel Attack (SCA) is one of these possible attacks. In this paper, timing side channel vulnerability against execution time of the HMAC-SHA1 authentication algorithm is considered. Both linear and negative binomial regression are used to model some security features of the stored key, e.g., its length and Hamming weight. The goal is to reveal secret-related information based on leakage models. The results would mitigate the cryptanalysis process of an attacker.
机译:相量测量单位(PMU)或同步素频率正在迅速部署在智能电网中,其目标是从广域分布变电站同时测量相量量。 PMU通信基础设施有各种安全攻击。定时侧通道攻击(SCA)是其中一个可能的攻击之一。在本文中,考虑了针对HMAC-SHA1认证算法的执行时间的定时侧通道漏洞。线性和负二进制回归均用于模拟存储键的一些安全特征,例如,其长度和汉明重量。目标是基于泄漏模型揭示与秘密相关信息。结果将减轻攻击者的密码分析过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号