首页> 外文期刊>International Journal of Internet Technology and Secured Transactions >A simulation-based correlation power analysis attack to FPGA implementation of KASUMI block cipher
【24h】

A simulation-based correlation power analysis attack to FPGA implementation of KASUMI block cipher

机译:基于仿真的相关功率分析攻击KASUMI分组密码的FPGA实现

获取原文
获取原文并翻译 | 示例
           

摘要

Correlation power analysis (CPA) is a powerful kind of power analysis attacks that is able to break ciphers using correlation between power consumption of the device and hamming weight of the key-dependent values of the algorithm. This paper describes a successful CPA attack against FPGA implementation of KASUMI, a block cipher used in the confidentiality and integrity algorithms of the 3rd generation partnership program (3GPP) mobile communications which is also very suitable for hardware implementation. The main contribution of this paper is that it presents a simulation-based CPA attack which does not need any experimental setup and leads to considerable saving in time and cost. To the best of our knowledge, there are a few articles that present simulation-based power analysis of block ciphers in detail, and specifically, there is no report about mounting of simulation-based or non-simulation-based power analysis attack against hardware implementation of KASUMI in the open literature.
机译:相关功率分析(CPA)是一种强大的功率分析攻击,它能够使用设备功耗与算法密钥相关值的汉密权重之间的相关性来破解密码。本文介绍了针对FPGA实现KASUMI的成功CPA攻击,KASUMI是在第三代合作伙伴计划(3GPP)移动通信的机密性和完整性算法中使用的分组密码,它也非常适合于硬件实现。本文的主要贡献在于,它提出了一种基于模拟的CPA攻击,该攻击不需要任何实验设置,并且可以节省大量时间和成本。据我们所知,有几篇文章详细介绍了基于仿真的分组密码功率分析,尤其是,没有关于针对硬件实现安装基于仿真或基于非仿真功率分析攻击的报道。公开文献中的KASUMI。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号