...
首页> 外文期刊>Electronics Letters >Machine learning based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard
【24h】

Machine learning based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard

机译:基于机器学习的具有汉明距离重新分布的边路攻击对策及其在高级加密标准中的应用

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Side channel analysis (SCA) is effective to reveal the key of crypto devices by applying statistical analysis to a number of power traces, thus hardware countermeasure is necessary to protect the crypto circuits. A SCA-resistance methodology by machine learning trained power compensation module is proposed to compensate the probability of hamming distance (HD) of the intermediate data directly, to make it unable to be distinguished from correct and incorrect sub-key, thus providing resistance to SCA. The machine learning algorithm is used to find out the best HD redistribution mapping by using neural dynamic programming. Implemented on an AES-128 encryption algorithm circuit on a Xilinx Spartan-6 FPGA mounted on a SAKURA-G board, experimental SCA results show that it can provide more than 200 × measures to disclosure and still has no sign to reveal the advanced encryption standard (AES) sub-key. In addition, it has low power and area overhead and zero frequency overhead, thus is appropriate for hardware implementation of SCA countermeasure.
机译:通过对许多电源迹线进行统计分析,边信道分析(SCA)可以有效地揭示加密设备的密钥,因此必须采取硬件对策来保护加密电路。提出了一种基于机器学习训练的功率补偿模块的SCA抵抗方法,以直接补偿中间数据的汉明距离(HD)的概率,使其无法与正确和不正确的子密钥区分开,从而为SCA提供抵抗力。机器学习算法用于通过使用神经动态编程来找出最佳的HD重新分配映射。 SCA实验结果在安装在SAKURA-G板上的Xilinx Spartan-6 FPGA上的AES-128加密算法电路上实现,实验SCA结果表明,它可以提供200多种×的公开措施,但仍然没有迹象表明高级加密标准(AES)子密钥。另外,它具有较低的功率和面积开销以及零频率开销,因此适用于SCA对策的硬件实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号