首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
【24h】

Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform

机译:基于傅立叶变换的抗DPA的S-Box实现的功耗分析

获取原文
获取原文并翻译 | 示例

摘要

This paper shows two power analysis attacks against a software implementation of a first-order DPA resistant S-box algorithm that is based on the discrete Fourier Transform (DFT). The DPA resistant S-box algorithm based on DFT was proposed by Prouff et al. in 2006 and improved by Coron et al. in 2008, respectively. In our attacks against the improved one, we pre-process the power traces by separating them into two subgroups, so that each has a biased mask. For the separated power traces, two post analysis methods are proposed to identify the key. One is based on DPA attack against one subgroup, and the other utilizes the difference of means for two subgroups and a pattern matching. Finally, we compare these two attack methods and propose an algorithm-level countermeasure to enhance the security of S-box calculation based on the DFT.
机译:本文展示了针对基于离散傅立叶变换(DFT)的一阶抗DPA的S-box算法的软件实现的两种功耗分析攻击。 Prouff等人提出了基于DFT的抗DPA的S-box算法。在2006年得到了Coron等人的改进。分别在2008年。在针对改进型电源线的攻击中,我们将电源线分成两个子组进行预处理,以使每个电源线组都有一个有偏差的掩码。对于分离的功率迹线,提出了两种后分析方法来识别密钥。一种基于DPA攻击一个子组,另一种则利用两个子组的均值差异和模式匹配。最后,我们比较了这两种攻击方法,并提出了一种算法级的对策,以提高基于DFT的S-box计算的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号