In recent years,power analysis attack has become one of the most serious threats to block ciphers implemented on integrated circuits,and the research of this field about attack and defense is a hot spot of cryptographic side channel attacks. This paper introduced correlation power analysis attack on Block Cipher ARIA which was announced by Korea National Security Institute. All its theories are based upon the physical characters, power consumption models and data-dependent power consumption. The methods and steps of CPA were presented in detail,and correct secret key of encryption algorithm was cracked successfully with experiments. Experiment results demonstrate that ARIA is vulnerable to correlation power analysis attack by nonlinear S-box lookup table in the operating leaked. Simulation environment of 10 samples are enough to obtain the 128 bit master key in a short time.%功耗攻击已对密码算法实现的物理安全性构成严重威胁,对其攻击和防御的研究是近年来旁路攻击的热点问题.研究了ARIA韩国国家分组密码的相关功耗分析攻击方法.阐述了ARIA密码算法,给出了密码算法功耗泄露模型及相关性分析的原理,结合ARIA算法给出了相关功耗分析的具体方法,并通过仿真实验验证了攻击的有效性.结果表明,ARIA密码中的非线性S盒查表操作功耗泄露使其易遭受相关功耗分析攻击;仿真环境下10个样本的采集和分析即可恢复ARIA主密钥.
展开▼