...
首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers
【24h】

How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers

机译:如何确定功率分析的选择功能:从分组密码器的硬件架构的角度

获取原文
获取原文并翻译 | 示例

摘要

In this paper we first demonstrate that effective selection functions in power analysis attacks change depending on circuit architectures of a block cipher. We then conclude that the most resistant architecture on its own, in the case of the loop architecture, has two data registers have separate roles: one for storing the plaintext and ciphertext, and the other for storing intermediate values. There, the pre-whitening operation is placed at the output of the former register. The architecture allows the narrowest range of selection functions and thereby has resistance against ordinary CPA. Thus, we can easily defend against attacks by ordinary CPA at the architectural level, whereas we cannot against DPA. Secondly, we propose a new technique called "self-templates" in order to raise the accuracy of evaluation of DPA-based attacks. Self-templates enable to differentiate meaningful selection functions for DPA-based attacks without any strong assumption as in the template attack. We also present the results of attacks to an AES co-processor on an ASIC and demonstrate the effectiveness of the proposed technique.
机译:在本文中,我们首先证明功率分析攻击中的有效选择功能会根据分组密码的电路架构而变化。然后我们得出结论,在循环体系结构的情况下,最容易抵抗的体系结构本身具有两个数据寄存器,它们分别具有不同的作用:一个用于存储明文和密文,另一个用于存储中间值。在那里,预白化操作位于前一个寄存器的输出处。该架构允许选择功能的范围最窄,因此可以抵抗普通的CPA。因此,我们可以轻松地在体系结构级别上防御普通CPA的攻击,而不能防御DPA。其次,我们提出一种称为“自我模板”的新技术,以提高基于DPA的攻击评估的准确性。自我模板可区分基于DPA的攻击的有意义的选择功能,而无需像模板攻击中那样强力假设。我们还向ASIC上的AES协处理器提供了攻击的结果,并证明了所提出技术的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号