【24h】

Comprehensive Side-Channel Power Analysis of XTS-AES

机译:XTS-AES的全面侧信道功率分析

获取原文
获取原文并翻译 | 示例

摘要

XTS-advanced encryption standard (AES) is an advanced mode of AES for data protection of sector-based devices. It features two secret keys instead of one, and an additional tweak for each data block. These characteristics make the mode not only resistant against cryptoanalysis attacks, but also more challenging for side-channel attack. In this paper, we comprehensively analyze the side-channel power leakage of various XTS-AES implementations and invent effective attacks. We first run a simple power analysis of a software implementation. For a hardware implementation on field-programmable gate array (FPGA), we analyze side-channel leakage of the particular modular multiplication in XTS-AES mode. In addition, we utilize the relationship between two consecutive block tweaks and propose a method to work around the masking of ciphertext by the tweak. These attacks are verified on an FPGA implementation of XTS-AES. The results show that XTS-AES is susceptible to side-channel power analysis attacks, and therefore dedicated protections are required for security of XTS-AES in storage devices.
机译:XTS先进的加密标准(AES)是AES的高级模式,用于基于扇区的设备的数据保护。它具有两个秘密密钥而不是一个,并对每个数据块进行了额外的调整。这些特性使该模式不仅可以抵抗密码分析攻击,而且对于边信道攻击也更具挑战性。在本文中,我们全面分析了各种XTS-AES实现的边信道功率泄漏,并发明了有效的攻击方法。我们首先对软件实现进行简单的功耗分析。对于现场可编程门阵列(FPGA)的硬件实现,我们分析了XTS-AES模式下特定模块化乘法的边通道泄漏。另外,我们利用两个连续的块调整之间的关系,并提出了一种方法来解决该调整对密文的掩盖。这些攻击已在XTS-AES的FPGA实现中得到验证。结果表明,XTS-AES容易受到边信道功率分析攻击,因此对于存储设备中XTS-AES的安全性需要专用的保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号