...
首页> 外文期刊>International journal of communications, network, and system sciences >Efficient DPA Attacks on AES Hardware Implementations
【24h】

Efficient DPA Attacks on AES Hardware Implementations

机译:对AES硬件实现的有效DPA攻击

获取原文
           

摘要

This paper presents an effective way to enhance power analysis attacks on AES hardware implementations. The proposed attack adopts hamming difference of intermediate results as power mode. It arranges plaintext inputs to differentiate power traces to the maximal probability. A simulation-based AES ASIC implementation and experimental platform are built. Various power attacks are conducted on our AES hardware implementation. Unlike on software implementations, conventional power attacks on hardware implementations may not succeed or require more computations. However, the method we proposed effectively improves the success rate using acceptable number of power traces and fewer computations. Furthermore from experimental data, the correlation factor between the hamming distance of key guesses and the difference of DPA traces has the value 0.9233 to validate power model and attack results.
机译:本文提出了一种增强对AES硬件实现的功率分析攻击的有效方法。提出的攻击采用中间结果的汉明差异作为幂模式。它安排明文输入以区分功率迹线,以最大的概率。建立了基于仿真的AES ASIC实现和实验平台。我们的AES硬件实施方式受到了各种各样的攻击。与在软件实现上不同,对硬件实现的常规功率攻击可能不会成功或需要更多计算。但是,我们提出的方法使用可接受数量的功率迹线和较少的计算有效地提高了成功率。此外,根据实验数据,关键猜测的汉明距离与DPA迹线差异之间的相关因子具有0.9233的值,以验证功率模型和攻击结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号